Navigating the Digital Shadows with RATs
The Stealthy World of Remote Access Trojans A Cautionary Tale In a quiet suburb, Sarah, a regular smartphone user, experienced…
The Stealthy World of Remote Access Trojans A Cautionary Tale In a quiet suburb, Sarah, a regular smartphone user, experienced…
Balada Injector malware infected more than 7100 WordPress sites using a vulnerable version of the Popup Builder plugin. In September,…
Researchers devised a new attack that exploits misconfigurations in Apache Hadoop and Flink to deploy cryptocurrency miners. Cybersecurity researchers from…
Apple addressed a recently disclosed Bluetooth keyboard injection vulnerability with the release of Magic Keyboard firmware. Apple released Magic Keyboard…
By Mirel Sehic, Global Director of Cyber Security, Honeywell In an increasingly digitized world, the looming threat of cyberattacks has…
By Manish Gohil, Senior Associate, Dragonfly The war in Ukraine has seen the emergence of highly-disruptive cyber criminals, motivated less…
Forescout experts questioned the attribution of cyber attacks that targeted the energy sector in Denmark in 2023 to the Russia-linked…
The National Police of Ukraine, with the support of Europol, arrested the alleged mastermind behind a sophisticated cryptojacking scheme. The…
The cryptocurrency rollercoaster never fails to provide a thrilling ride – this week it was a drama surrounding the hack…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…