The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their website, even as the flagship […]
Author: cyberbytes
Top 10 Best Supply Chain Risk Management Solutions in 2025
In today’s globalized world, managing supply chain risks has become a top priority for businesses. From cybersecurity threats and compliance issues to supplier sustainability and […]
Jaguar Land Rover Shows Cyberattacks Mean (Bad) Business
The company likely failed to completely clean out attackers from a previous breach and now is a case study for the high cost of ransomware. […]
New Android Spyware Targeting Users by Imitating Signal and ToTok Apps
ESET researchers have uncovered two sophisticated Android spyware campaigns that target users seeking secure communication platforms by impersonating popular messaging apps Signal and ToTok. These […]
BCI: The Thing of Nightmare or Dreams?
Brain computer interface technology looks to provide users with hands-free device control, but could security ever keep up with the risks? ​The original article found […]
Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL
Brazilian users have emerged as the target of a new self-propagating malware that spreads via the popular messaging app WhatsApp. The campaign, codenamed SORVEPOTEL by […]
New XWorm V6 Variant Embeds Malicious Code into Trusted Windows Applications
In the constantly evolving world of cyber threats, staying informed is not just an advantage; it’s a necessity. First observed in 2022, XWorm quickly gained […]
DrayOS Router Flaw Allows Remote Code Execution by Attackers
A critical vulnerability affecting DrayOS routers could let unauthenticated attackers execute code remotely. Discovered on July 22 by Pierre-Yves Maes of ChapsVision, the flaw stems […]
Threat Actors Pose as Government Officials to Attack Organizations with StallionRAT
In a recent wave of targeted phishing campaigns, the Cavalry Werewolf cluster has escalated its operations by impersonating government officials and deploying both FoalShell and […]
UAT-8099 Hijacks Reputable Sites for SEO Fraud & Theft
A Chinese-language threat actor uses every part of the kill: infecting Web servers with malware, poisoning sites with SEO spam, and stealing organizational data for […]