ROKRAT Detection: Malware Adopts New Deployment Methods Relying on Large LNK Files
Adversaries are constantly looking for novel ways to overcome security protections. After Microsoft started blocking macros for Office documents by…
Adversaries are constantly looking for novel ways to overcome security protections. After Microsoft started blocking macros for Office documents by…
Since the outbreak of the global cyber war, state bodies of Ukraine and its allies have become targets of diverse…
The infamous russian nation-backed hacking collective tracked as APT28 or UAC-0001, which has a history of targeted attacks against Ukrainian…
The popular open-source data visualization and data exploration tool, Apache Superset, is claimed to be vulnerable to authentication bypass and…
PaperCut has recently reported that the company’s application servers are vulnerable to a critical RCE flaw known as CVE-2023-27350, with…
Cybersecurity researchers have uncovered a new malware family called Domino attributed to the adversary activity of the financially motivated russia-backed…
The notorious North Korean hacking collective Lazarus Group, also tracked as APT38, Dark Seoul, or Hidden Cobra, has earned its…
With the tax season in full swing, threat actors are setting eyes on financial organizations. According to the latest cybersecurity…
With a growing number of zero-day flaws affecting widely used software products, proactive detection of vulnerability exploitation has been among…
With a 250% surge of cyber attacks against Ukraine in 2022 and over 2,000 of them launched by russia-affiliated threat…