Attackers are increasingly abandoning noisy, direct attacks in favor of more subtle, stealthy tactics. They are flying under ...
GootLoader malware is abusing malformed ZIP archives that bypass common tools like WinRAR & deliver JavaScript payloads via ...
Cybercriminals use ErrTraffic tool to automate malware distribution through fake browser error messages, with attacks achieving 60% conversion rates.
CERT-UA reports PLUGGYAPE malware attacks targeting Ukrainian defense forces via Signal and WhatsApp, using phishing links ...
A ransomware operation known as DeadLock has been observed abusing Polygon blockchain smart contracts to manage and rotate ...
Cybersecurity researchers are becoming interested in a newly discovered ransomware strain called DeadLock that abuses Polygon smart contracts to silently service its infrastructure and bypass ...
A new ClickFix social engineering campaign is targeting the hospitality sector in Europe, using fake Windows Blue Screen of ...
Unlike traditional shell replacements like Cairo Shell or Open-Shell that are built with native Windows APIs and compiled C++ ...
The DeadLock ransomware group, a newly emerged digital extortion group, is using blockchain smart contracts to store proxy ...
The pre-positioning approach of Littleton and Volt Typhoon is indicative of Beijing’s emerging interest in waging war against entire systems, attacking the connective tissue that allows an adversary ...
Group-IB researchers said the most unusual aspect of DeadLock lies in its use of Polygon smart contracts to manage ...
A vulnerability in SmarterTools’ SmarterMail platform could lead to remote code execution on vulnerable mail servers.