‘Coronavirus Report’ Emails Spread NetSupport RAT, Microsoft Warns
Attackers used malicious Excel 4.0 documents to spread the weaponized NetSupport RAT in a spear-phishing campaign.
Attackers used malicious Excel 4.0 documents to spread the weaponized NetSupport RAT in a spear-phishing campaign.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Cisco has fixed a critical remote code-execution flaw in its popular customer interaction management solution.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Cisco has fixed a critical remote code-execution flaw in its popular customer interaction management solution.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Looking for niche anomalies in an automated way with AI and machine learning is the future.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
Today, cybersecurity researchers shed light on an Iranian cyber espionage campaign directed against critical infrastructures in Kuwait and Saudi Arabia. Bitdefender said the intelligence-gathering operations were conducted by Chafer APT (also known as APT39 or Remix Kitten), a threat actor known for its attacks on telecommunication and travel industries in the Middle East to collect…
The advent of the Covid-19 pandemic and the impact on our society has resulted in many dramatic changes to how people are traveling, interacting with each other, and collaborating at work. There are several trends taking place as a consequence of the outbreak, which has only continued to heighten the need for the tightest possible…
The operators behind the Toll Group attack are taking applications for technically advanced partners.
Jessica spends 12 hours a day on the internet managing security for web assets and loves her macha tea
The Ukrainian police have arrested a hacker who made headlines in January last year by posting a massive database containing some 773 million stolen email addresses and 21 million unique plaintext passwords for sale on various underground hacking forums. In an official statement released on Tuesday, the Security Service of Ukraine (SBU) said it identified…
As cyberattacks continue to proliferate in volume and increase in sophistication, many organizations acknowledge that some part of their breach protection must be outsourced, introducing a million-dollar question of what type of service to choose form. Today, Cynet releases the Security Outsourcing Guide (download here), providing IT Security executives with clear and actionable guidance on…
Israeli cybersecurity researchers have disclosed details about a new flaw impacting DNS protocol that can be exploited to launch amplified, large-scale distributed denial-of-service (DDoS) attacks to takedown targeted websites. Called NXNSAttack, the flaw hinges on the DNS delegation mechanism to force DNS resolvers to generate more DNS queries to authoritative servers of attacker’s choice, potentially…