Unveiling the collaborative efforts of GhostSec and Stormous in executing ransomware attacks across 15+ countries, affecting multiple sectors. Discover the impact, technical details, and preventive measures.
cybersecurity
Uncover the latest TA577 phishing campaign exploiting NTLM hashes for unauthorized access. Learn how organizations can defend against these sophisticated attacks.
Explore the Silver SAML technique, a new cybersecurity threat allowing unauthorized access to applications without compromising identity providers directly. Learn protective measures.
Discover the new Linux variant of BIFROSE RAT using a deceptive VMware domain for evasion. Learn how to protect your systems with our detailed analysis and recommendations.
Uncover the tactics used by Lazarus Group to compromise developers’ systems via PyPI, and learn key strategies to safeguard your software against such threats.
Explore the details of the ransomware attack on ICBC’s US unit, its impact on financial markets, and the recovery efforts underway. Learn how to protect against future threats.
Discover how BlazeStealer malware, hidden in Python packages on PyPI, poses significant threats to developers. Learn prevention tips to safeguard your projects.
Discover the details of the ObjCShellz malware targeting macOS, attributed to N. Korea’s BlueNoroff group. Learn the technical aspects, implications, and essential prevention strategies.
Discover how Lace Tempest exploited the CVE-2023-47246 zero-day vulnerability in SysAid IT support software to deploy Gracewire malware, including Microsoft’s findings and protection recommendations.
Discover the critical vulnerability CVE-2023-22518 in Atlassian Confluence being exploited to deploy Cerber ransomware, posing significant security risks.