Analysis and Config Extraction of Lu0Bot, a Node.js Malware with Considerable Capabilities
Nowadays, more malware developers are using unconventional programming languages to bypass advanced detection systems. The Node.js malware Lu0Bot is a…
Nowadays, more malware developers are using unconventional programming languages to bypass advanced detection systems. The Node.js malware Lu0Bot is a…
A governmental entity in Guyana has been targeted as part of a cyber espionage campaign dubbed Operation Jacana. The activity,…
A new Android banking trojan named GoldDigger has been found targeting several financial applications with an aim to siphon victims'…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws to its Known Exploited Vulnerabilities (KEV)…
Apple on Wednesday rolled out security patches to address a new zero-day flaw in iOS and iPadOS that it said…
Atlassian has released fixes to contain an actively exploited critical zero-day flaw impacting publicly accessible Confluence Data Center and Server…
New findings have identified connections between an Android spyware called DragonEgg and another sophisticated modular iOS surveillanceware tool named LightSpy.…
Today, mid-sized companies and their CISOs are struggling to handle the growing threat of SaaS security with limited manpower and…
A new deceptive package hidden within the npm package registry has been uncovered deploying an open-source rootkit called r77, marking…
Microsoft has detailed a new campaign in which attackers unsuccessfully attempted to move laterally to a cloud environment through an…