Over the past months, the North Korean APT Lazarus has been employing a sophisticated and coordinated approach, targeting the technology,…
Cybersecurity experts at Infoblox Threat Intel have uncovered a sophisticated botnet leveraging misconfigured DNS records to bypass email protection systems…
Fortinet researchers uncovered an advanced rootkit malware exploiting multiple zero-day vulnerabilities in enterprise appliances by executing a shell script (Install.sh).…
Researchers analyzed new versions of the Banshee macOS Stealer sample that initially evaded detection by most antivirus engines, as analysis…
Security researchers are tricked into downloading and executing information-stealing malware by a fake proof-of-concept (PoC) exploit for CVE-2024-49113, dubbed LDAPNightmare.…
Imagine an employee receiving an email that looks completely legitimate, maybe it’s a fake invoice or a shipping update. They…
The NonEuclid Remote Access Trojan (RAT), a highly sophisticated malware, has been detected, allowing unauthorized remote access via advanced evasion…
Threat actors leverage Out-of-Band Application Security Testing (OAST) techniques in the npm, PyPI, and RubyGems ecosystems to carry out multi-stage…
FireScam, an information stealer malware with spyware capabilities, is being disseminated as a fake "Telegram Premium" application. The malware spreads…
A malicious npm campaign that poses as the Hardhat plugins and the Nomic Foundation is observed to target Ethereum developers…