Category: Attack

Researchers Uncover SideWinder’s Latest Server-Based Polymorphism Technique

[ad_1] May 09, 2023Ravie LakshmananAdvanced Persistent Threat The advanced persistent threat (APT) actor known as…

Microsoft Warns of State-Sponsored Attacks Exploiting Critical PaperCut Vulnerability

[ad_1] May 09, 2023Ravie LakshmananCyber Espionage / Vulnerability Iranian nation-state groups have now joined financially…

New Ransomware Strain ‘CACTUS’ Exploits VPN Flaws to Infiltrate Networks

[ad_1] May 09, 2023Ravie LakshmananEndpoint Security / Ransomware Cybersecurity researchers have shed light on a…

SideCopy Using Action RAT and AllaKore RAT to infiltrate Indian Organizations

[ad_1] May 08, 2023Ravie LakshmananCyber Espionage / Threat Intel The suspected Pakistan-aligned threat actor known…

Western Digital Confirms Customer Data Stolen by Hackers in March Breach

[ad_1] May 08, 2023Ravie LakshmananData Breach / Ransomware Digital storage giant Western Digital confirmed that…

Private Code Signing Keys Leaked on the Dark Web

[ad_1] May 08, 2023Ravie LakshmananData Breach / Software Security The threat actors behind the ransomware…

Learn How to Defeat Ransomware with Identity-Focused Protection

[ad_1] May 08, 2023The Hacker NewsWebinar / Ransomware Are you concerned about ransomware attacks? You're…

How to Set Up a Threat Hunting and Threat Intelligence Program

[ad_1] Threat hunting is an essential component of your cybersecurity strategy. Whether you're getting started…

CERT-UA Warns of SmokeLoader and RoarBAT Malware Attacks Against Ukraine

[ad_1] May 08, 2023Ravie LakshmananCyber Attack / Data Safety An ongoing phishing campaign with invoice-themed…

Dragon Breath APT Group Using Double-Clean-App Technique to Target Gambling Industry

[ad_1] May 06, 2023Ravie LakshmananAdvanced Persistent Threat An advanced persistent threat (APT) actor known as…