A sophisticated cyber espionage campaign targeting Ukrainian entities has been uncovered, revealing the latest tactics of the Russia-linked Gamaredon threat actor group. The attackers are […]
Author: cyberbytes
ClickFix Captcha – A Creative Technique That Allow Attackers Deliver Malware and Ransomware on Windows
A sophisticated social engineering technique has recently emerged in the cybersecurity landscape, rapidly gaining traction among threat actors seeking to distribute trojans, ransomware, and particularly […]
New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials
Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that’s primarily designed to target users in Spain and Turkey. “Crocodilus enters the scene […]
BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability
In what’s an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering […]
Evilginx Tool (Still) Bypasses MFA
Based on the open source NGINX Web server, the malicious tool allows threat actors to steal user credentials and session tokens. ​The original article found […]
Oracle Still Denies Breach as Researchers Persist
Evidence suggests an attacker gained access to the company’s cloud infrastructure environment, but Oracle insists that didn’t happen. ​The original article found on darkreading Read […]
Harmonic Security Raises $17.5M Series A to Accelerate Zero-Touch Data Protection to Market
Post Content ​The original article found on darkreading Read More
Concord Orthopaedic Notifies Individuals of Security Incident
Post Content ​The original article found on darkreading Read More
Malaysia PM Refuses to Pay $10M Ransomware Demand
The attack hit the Kuala Lumpur airport over the weekend, and it remains unclear who the threat actors are and what kind of information they […]
SecurityScorecard 2025 Global Third-Party Breach Report Reveals Surge in Vendor-Driven Attacks
Post Content ​The original article found on darkreading Read More