Cybersecurity News | Quick Read
APT28 Domains Used in Cyberattacks Against Ukraine Taken Down by Microsoft
The Domains Were Also Used in Attacks on Govt Institutions in the United States and Europe.
Cybersecurity News | Quick Read
The Conti Group Still in Business Regardless of the Data Leak It Faced
The Gang Continues to Exfiltrate Data from Their Victims.
Cybersecurity News | Quick Read
New FFDroider Malware Is Targeting Social Media Platform Users
FFDroider M.O. and How to Avoid It.
Cybersecurity News | Quick Read
The Works Hit by Massive Cyberattack
The British Retailer Became the Victim of Cyber-Security Breach.
Cybersecurity News | Quick Read
Russian Darknet Marketplace Hydra Shutdown by The US DOJ
Yesterday, the US DOJ and German Federal Police Impounded Hydra’s Servers and $25 Million Worth of Bitcoin.
Cybersecurity News | Quick Read
CashApp Customers Affected by Data Breach
8.2 Million US Customers Got Their Account Information Accessed.
Cybersecurity News | Quick Read
VLC Media Player Leveraged by Hackers to Distribute Malware Loader
The Threat Actors Employed DLL Side-Loading Techniques.
Cybersecurity News | Quick Read
Info-Stealing Malware Pushed Through WhatsApp Messages
Voice Messages Are Being Used as a Lure.
Cybersecurity News | Quick Read
Crypto Customers Targeted in MailChimp Data Breach
Fake Phishing Notifications Lured Clients to Reset Their Wallet PINs.
Cybersecurity News | Quick Read
A Fake Data Breach Used Emails to Steal Cryptocurrency Wallets
Trezor Users Have Been Targeted by a Phishing Campaign.
Cybersecurity News | Quick Read
New RAT Dubbed Borat Emerging on the Cyberthreat Landscape
The Malware Shows a Broad Range of Functionalities.
Cybersecurity News | Quick Read
Viasat’s Satellite Modems Wiped
The Malicious Actors Used the AcidRain Malware.
Cybersecurity News | Quick Read
BlackGuard, a New Info-Stealer, for Sale on Russian Hacking Forums
A “Sophisticated” Malware with Obfuscation and Antibugging Capabilities.
Cybersecurity Basics | Quick Read
Why Is S/MIME Important for Email Security, and How Does It Work.
Cybersecurity News | Quick Read
JupyterLab’s Web Notebooks Hit Clipped Emergent Python-based Ransomware Strain
Nameless Malware ‘Honeypotted’ After the Attack
Cybersecurity News | Quick Read
Deep Panda Hacking Group Is Targeting VMware Horizon Servers
The Threat Actors Are Trying to Install an Unique Rootkit Known as ‘Fire Chili’.
Cybersecurity News | Quick Read
National Emergency in the United States Prolonged
The Decision Was Taken Due to Elevated Malicious Cyber Activity.
Cybersecurity News | Quick Read
NATO Countries Targeted in Russian Phishing Attacks, Google Reports
Threat Actors Lure Targets to Open Malicious Emails or Click on Malicious Links.
Cybersecurity News | Quick Read
IT and Software Consultancy Company Globant Got Hacked
The Lapsus$ Extorsion Group Leaked 70GB of Stolen Data.
Cybersecurity News | Quick Read
Election Officials Warned by the FBI of Credential Phishing Campaigns
Mitigations to Reduce the Risk of Compromise.
Cybersecurity News | Quick Read
Mars Stealer: a New Popular Malware on the Cyberthreat Landscape
OpenOffice Ads on Google Are Leveraged to Distribute It.
Cybersecurity News | Quick Read
It Seems that Conti Ransomware Was Behind the Attack.
Forensics and threat hunting | Quick Read
Threat Hunting Journal – March 2022 E.O.M Edition
Top Malware(s) Detection: 1st of March – 28th of March
Cybersecurity News | Quick Read
SunCrypt Ransomware Still Alive in 2022
The RaaS Seems to Have Developed a New and Improved Version of Their Strain.
Cybersecurity News | Quick Read
Threat Actors Hijack Email Reply Chains on Vulnerable Exchange Servers to Deliver IcedID Malware
Energy, Healthcare, Law, and Pharmaceutical Sectors Were Allegedly Targeted in the Latest Wave of Cyberattacks.
Cybersecurity News | Quick Read
Purple Fox Threat Actors Leverage New FatalRAT Version
They Use Improved Evasion Methods.
Cybersecurity News | Quick Read
V8 Vulnerability Hits Chrome and Edge
The Bug Is Located in the JavaScript Engine Dubbed V8.
Cybersecurity News | Quick Read
New Korplug Variant Discovered
The Variation of the PlugX Remote Access Tool Was Named Hodur.
Cybersecurity Basics | Quick Read
What Is FOSS Software? Definition, Usage, and Vulnerabilities
FOSS (Free Open-Source Software) vs. OSS (Open-Source Software) vs. CSS (Closed-Source Software)
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats