A sophisticated cyber espionage campaign targeting Ukrainian entities has been uncovered, revealing the latest tactics of the Russia-linked Gamaredon threat actor group. The attackers are […]
ClickFix Captcha – A Creative Technique That Allow Attackers Deliver Malware and Ransomware on Windows
A sophisticated social engineering technique has recently emerged in the cybersecurity landscape, rapidly gaining traction among threat actors seeking to distribute trojans, ransomware, and particularly […]
New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials
Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that’s primarily designed to target users in Spain and Turkey. “Crocodilus enters the scene […]
BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability
In what’s an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated with a ransomware group called BlackLock, uncovering […]
Evilginx Tool (Still) Bypasses MFA
Based on the open source NGINX Web server, the malicious tool allows threat actors to steal user credentials and session tokens. The original article found […]
Oracle Still Denies Breach as Researchers Persist
Evidence suggests an attacker gained access to the company’s cloud infrastructure environment, but Oracle insists that didn’t happen. The original article found on darkreading Read […]
Harmonic Security Raises $17.5M Series A to Accelerate Zero-Touch Data Protection to Market
Post Content The original article found on darkreading Read More
Concord Orthopaedic Notifies Individuals of Security Incident
Post Content The original article found on darkreading Read More
Malaysia PM Refuses to Pay $10M Ransomware Demand
The attack hit the Kuala Lumpur airport over the weekend, and it remains unclear who the threat actors are and what kind of information they […]
SecurityScorecard 2025 Global Third-Party Breach Report Reveals Surge in Vendor-Driven Attacks
Post Content The original article found on darkreading Read More