Sunburst’s C2 Secrets Reveal Second-Stage SolarWinds Victims
Examining the backdoor’s DNS communications led researchers to find a government agency and a big U.S. telco that were flagged for further exploitation in the spy campaign.
Read MoreExamining the backdoor’s DNS communications led researchers to find a government agency and a big U.S. telco that were flagged for further exploitation in the spy campaign.
Read MoreThe hotly anticipated game — featuring a digital Keanu Reeves as a major character — is being used as a lure for cyberattacks.
Read MoreA raft of obfuscation techniques turn the heat up for the hacking-for-hire operation.
Read MoreThe post-COVID-19 surge in the criticality level of medical infrastructure, coupled with across-the-board digitalization, will be big drivers for medical-sector cyberattacks next year.
Read MoreRansomware gangs with zero-days and more players overall will characterize financially motivated cyberattacks next year.
Read MoreFake Minecraft Modpacks on Google Play deliver millions of abusive ads and make normal phone use impossible.
Read MoreThe APT threat landscape is a mixed bag of tried-and-true tactics and cutting-edge techniques, largely supercharged by geo-politics, a report finds.
Read MoreThe Roaming Mantis group is targeting the States with a malware that can steal information, harvest financial data and send texts to self-propagate.
Read MoreAmazon, Apple, Netflix, Facebook and WhatsApp are top brands leveraged by cybercriminals in phishing and fraud attacks – including a recent strike on a half-million Facebook users.
Read MoreBy continuing to use the site, you agree to the use of cookies. more information
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.