This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here
Category: Cyber Security
Limits of Automation
How Interactive Sandboxing Can Benefit Your Organization By Vlad Ananin, Technical Writer at Any.Run The current rate and complexi...
Cyber Resiliency in The Age Of AI: Securing the Digital...
In the fast-moving age of artificial intelligence (AI), cybersecurity is more important than ever before. By Tyler Derr, Chief Tec...
UNC1151 Hackers Weaponizing Excel Documents To Attack W...
Mandiant identified a UNC1151 information campaign targeting Ukraine, Lithuania, Latvia, and Poland with disinformation, as CRIL l...
Microsoft Details On Using KQL To Hunt For MFA Manipula...
It is difficult to secure cloud accounts from threat actors who exploit multi-factor authentication (MFA) settings. Threat actors ...
Tenable Acquires Eureka Security To Provide Data Securi...
Tenable® Holdings, Inc., a leading Exposure Management company, has announced a definitive agreement to acquire Eureka Security, I...
300+ Times Downloaded Package from PyPI Contains Wiper ...
ReversingLabs researchers recently uncovered a malicious open-source package named xFileSyncerx on the Python Package Index (PyPI)...
SPECTR Malware Attacking Defense Forces of Ukraine With...
The government computer emergency response team of Ukraine, CERT-UA, in direct cooperation with the Cyber Security Center of the A...
North Korean Kimsuky Attacking Arms Manufacturer In Eur...
The North Korean state-sponsored group known as Kimsuky has launched a sophisticated cyber-espionage campaign targeting a prominen...
Hacktivist Groups Attacking Industrial Control Systems ...
Hacktivist groups are increasingly targeting critical infrastructure’s Operational Technology (OT) systems, motivated by geopoliti...
Muhstik Malware Attacking Apache RocketMQ To Execute Re...
Apache RocketMQ platform is a widely used messaging system that handles high volumes of data and critical operations, often attrac...
GoldPickaxe iOS Malware Harvests Facial Recognition Dat...
Due to the growing popularity of Apple devices, cybercriminals are increasingly targeting iOS and macOS with malware. The App Stor...
Sticky Werewolf Weaponizing LNK Files Group Attacking T...
Sticky Werewolf, a cyber threat group, has shifted its targeting strategy from sending phishing emails with download links to mali...