Power Generator in South Africa hit with DroxiDat and Cobalt Strike
Threat actors employed a new variant of the SystemBC malware, named DroxiDat, in attacks aimed at African critical infrastructure. Researchers…
Threat actors employed a new variant of the SystemBC malware, named DroxiDat, in attacks aimed at African critical infrastructure. Researchers…
Presently sponsored by: Secure your assets, identity and online accounts with our award-winning ID theft protection. Get started with Aura…
Results from the National Institute of Water and Atmospheric Research Limited annual squid survey: This year, the team unearthed spectacular…
API (or Application Programming Interface) is a ubiquitous term in the tech community today, and it’s one with a long…
Really interesting “systematization of knowledge” paper: “SoK: The Ghost Trilemma” Abstract: Trolls, bots, and sybils distort online discourse and compromise…
Researchers warn that the Gafgyt botnet is actively exploiting a vulnerability impacting the end-of-life Zyxel P660HN-T1A router. A variant of…
Germany’s Federal Office for the Protection of the Constitution (BfV) warns that the Charming Kitten APT group targeted Iranian dissidents…
Experts warn that a new info-stealer named Statc Stealer is infecting Windows devices to steal a broad range of sensitive…
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) observed a new backdoor, named Whirlpool, in attacks on Barracuda ESG appliances.…
Cryptographic flaws still matter. Here’s a flaw in the random-number generator used to create private keys. The seed has only…