Hacking North Korean Kimsuky group’s attack chain blends with legitimate traffic by March 18, 2024 by March 18, 2024 A recent attack campaign by one of North Korea’s state-run hacking groups uses a… 0 FacebookTwitterPinterestEmail
Hacking BianLian group exploits TeamCity again, deploys PowerShell backdoor by March 11, 2024 by March 11, 2024 “The threat actor leveraged two files, winpty-agent.exe and winpty.dll to the build servers, which… 0 FacebookTwitterPinterestEmail
Hacking Magnet Goblin hackers used Ivanti bugs to drop custom Linux malware by March 11, 2024 by March 11, 2024 “Check Point Research has been tracking these exploitations and identified several activity clusters targeting… 0 FacebookTwitterPinterestEmail
Hacking Evasive Panda leverages Monlam Festival to target Tibetans by March 10, 2024 by March 10, 2024 ESET researchers discovered a cyberespionage campaign that, since at least September 2023, has been… 0 FacebookTwitterPinterestEmail
Hacking Apple warns users against critical memory corrupting attacks by March 6, 2024 by March 6, 2024 Apple is advising immediate patching against two critical zero-day vulnerabilities attackers are using to carry… 0 FacebookTwitterPinterestEmail
Hacking Insecure Apex code plagues many Salesforce deployments by February 23, 2024 by February 23, 2024 Security researchers warn that many organizations have instances of insecure Apex code in their… 0 FacebookTwitterPinterestEmail
Hacking Information operation targeting Ukrainian speakers in the context of the war by February 22, 2024 by February 22, 2024 ESET products and research have been protecting Ukrainian IT infrastructure for years. Since the… 0 FacebookTwitterPinterestEmail
Hacking Is hybrid encryption the answer to post-quantum security? by February 21, 2024 by February 21, 2024 For some internal classified work, the NSA also pushes multiple layers of encryption. Their… 0 FacebookTwitterPinterestEmail
Hacking New Redis attack campaign weakens systems before deploying cryptominer by February 20, 2024 by February 20, 2024 If the attackers gain access to a server using some other method — for… 0 FacebookTwitterPinterestEmail
Hacking How digital forensics unlocks the truth by February 15, 2024 by February 15, 2024 The burgeoning field of digital forensics plays a crucial role in investigating a wide… 0 FacebookTwitterPinterestEmail