
Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals
Ukrainian military entities are the focus on of a phishing marketing campaign that leverages drone manuals as lures to provide a Go-based open-resource submit-exploitation toolkit referred to as Merlin. “Given that drones or Unmanned Aerial Automobiles…
Ukrainian Military Targeted in Phishing Campaign Leveraging Drone ManualsRead More

Watch the Webinar — AI vs. AI: Harnessing AI Defenses Against AI-Powered Risks
Generative AI is a double-edged sword, if there at any time was one. There is broad agreement that resources like ChatGPT are unleashing waves of efficiency throughout the organization, from IT, to buyer encounter, to engineering.…
Watch the Webinar — AI vs. AI: Harnessing AI Defenses Against AI-Powered RisksRead More

Are You Willing to Pay the High Cost of Compromised Credentials?
Weak password procedures leave companies vulnerable to attacks. But are the normal password complexity requirements ample to safe them? 83% of compromised passwords would fulfill the password complexity and size needs of compliance criteria. That is…
Are You Willing to Pay the High Cost of Compromised Credentials?Read More

From Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and Taiwanese
Tibetan, Uyghur, and Taiwanese people today and businesses are the targets of a persistent marketing campaign orchestrated by a danger actor codenamed EvilBamboo to collect delicate information. “The attacker has produced faux Tibetan internet websites, alongside…
From Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and TaiwaneseRead More

New Report Uncovers Three Distinct Clusters of China-Nexus Attacks on Southeast Asian Government
An unnamed Southeast Asian governing administration has been qualified by numerous China-nexus menace actors as component of espionage campaigns targeting the location more than prolonged periods of time. “Whilst this action happened all-around the very same…

Deadglyph: New Advanced Backdoor with Distinctive Malware Tactics
Cybersecurity scientists have uncovered a earlier undocumented superior backdoor dubbed Deadglyph employed by a danger actor acknowledged as Stealth Falcon as section of a cyber espionage campaign. “Deadglyph’s architecture is strange as it is made up…
Deadglyph: New Advanced Backdoor with Distinctive Malware TacticsRead More
Get the latest news
Subscribe now and get the latest cyber security news in your email.