Teach a Man to Phish and He’s Set for Life News One frustrating aspect of email phishing is the frequency with… rooter August 9, 2023 4 min read 0
How Malicious Android Apps Slip Into Disguise News Researchers say mobile malware purveyors have been abusing a bug… rooter August 9, 2023 4 min read 0
QakBot Malware Operators Expand C2 Network with 15 New Servers News The operators associated with the QakBot (aka QBot) malware have… rooter August 9, 2023 1 min read 0
Hackers Abusing Cloudflare Tunnels for Covert Communications News New research has revealed that threat actors are abusing Cloudflare… rooter August 9, 2023 1 min read 0
Understanding Active Directory Attack Paths to Improve Security News Introduced in 1999, Microsoft Active Directory is the default identity… rooter August 9, 2023 1 min read 0
New Yashma Ransomware Variant Targets Multiple English-Speaking Countries News An unknown threat actor is using a variant of the… rooter August 9, 2023 1 min read 0
LOLBAS in the Wild: 11 Living-Off-The-Land Binaries That Could Be Used for Malicious Purposes News Cybersecurity researchers have discovered a set of 11 living-off-the-land binaries-and-scripts… rooter August 9, 2023 1 min read 0
New Malware Campaign Targets Inexperienced Cyber Criminals with OpenBullet Configs News A new malware campaign has been observed making use of… rooter August 9, 2023 1 min read 0
North Korean Hackers Targets Russian Missile Engineering Firm News Two different North Korean nation-state actors have been linked to… rooter August 9, 2023 1 min read 0
Enhancing Security Operations Using Wazuh: Open Source XDR and SIEM News In today's interconnected world, evolving security solutions to meet growing… rooter August 9, 2023 1 min read 0