Category: Cyber Security

Limits of Automation

How Interactive Sandboxing Can Benefit Your Organization By Vlad Ananin, Technical Writer at Any.Run The current rate and complexi...

Read More

Cyber Resiliency in The Age Of AI: Securing the Digital...

In the fast-moving age of artificial intelligence (AI), cybersecurity is more important than ever before. By Tyler Derr, Chief Tec...

Read More

UNC1151 Hackers Weaponizing Excel Documents To Attack W...

Mandiant identified a UNC1151 information campaign targeting Ukraine, Lithuania, Latvia, and Poland with disinformation, as CRIL l...

Read More

Microsoft Details On Using KQL To Hunt For MFA Manipula...

It is difficult to secure cloud accounts from threat actors who exploit multi-factor authentication (MFA) settings. Threat actors ...

Read More

Tenable Acquires Eureka Security To Provide Data Securi...

Tenable® Holdings, Inc., a leading Exposure Management company, has announced a definitive agreement to acquire Eureka Security, I...

Read More

300+ Times Downloaded Package from PyPI Contains Wiper ...

ReversingLabs researchers recently uncovered a malicious open-source package named xFileSyncerx on the Python Package Index (PyPI)...

Read More

SPECTR Malware Attacking Defense Forces of Ukraine With...

The government computer emergency response team of Ukraine, CERT-UA, in direct cooperation with the Cyber Security Center of the A...

Read More

North Korean Kimsuky Attacking Arms Manufacturer In Eur...

The North Korean state-sponsored group known as Kimsuky has launched a sophisticated cyber-espionage campaign targeting a prominen...

Read More

Hacktivist Groups Attacking Industrial Control Systems ...

Hacktivist groups are increasingly targeting critical infrastructure’s Operational Technology (OT) systems, motivated by geopoliti...

Read More

Muhstik Malware Attacking Apache RocketMQ To Execute Re...

Apache RocketMQ platform is a widely used messaging system that handles high volumes of data and critical operations, often attrac...

Read More

GoldPickaxe iOS Malware Harvests Facial Recognition Dat...

Due to the growing popularity of Apple devices, cybercriminals are increasingly targeting iOS and macOS with malware. The App Stor...

Read More

Sticky Werewolf Weaponizing LNK Files Group Attacking T...

Sticky Werewolf, a cyber threat group, has shifted its targeting strategy from sending phishing emails with download links to mali...

Read More

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here