Researchers warn of ongoing spear-phishing attacks by Russian threat actor Midnight Blizzard targeting individuals in various sectors. The attacks involve…
Phishing attackers employed an HTML smuggling technique to deliver a malicious payload, as the attack chain started with a phishing…
The RomCom malware family, particularly its SnipBot variant, has evolved into a sophisticated threat capable of ransomware, extortion, and targeted…
UNC2970, a North Korean cyber espionage group, used customized SumatraPDF trojans to deliver MISTPEN backdoors to victims through phishing emails…
Zoom is a widely used videotelephony software used for virtual meetings, and its wide audience base attracts the hackers most.…
Adversaries are employing Large Language Models to generate malicious code, delivered via phishing emails, for downloading diverse payloads, including Rhadamanthys,…
Threat actors often attack cloud services for several illicit purposes. Google Cloud is targeted due to its extensive and powerful…
Sticky Werewolf, a cyber threat group, has shifted its targeting strategy from sending phishing emails with download links to malicious…
Phishing attackers are distributing malicious HTML files as email attachments, containing code designed to exploit users by prompting them to…
A new RAT malware has been discovered to be targeting Android devices. This malware is capable of executing additional commands…