Microsoft has revealed that a Chinese threat actor it tracks as Storm-0940 is leveraging a botnet called...
Month: November 2024
With so many SaaS applications, a range of configuration options, API capabilities, endless integrations, and app-to-app connections,...
German law enforcement authorities have announced the disruption of a criminal service called dstat[.]cc that made it...
An overview of the activities of selected APT groups investigated and analyzed by ESET Research in Q2...
SteelFox malware targets software pirates through fake activation tools, stealing credit card data and deploying crypto miners....
ESET researchers discovered a previously undocumented toolset used by Evasive Panda to access and retrieve data from...
A critical vulnerability just received a fix with the latest Kubernetes Image Builder release. The… Hard-Coded Credentials...
Attackers are increasingly distributing malware through a rather unusual method: a fake CAPTCHA as the initial infection...
Introduction Organizations often rely on a layered defense strategy, yet breaches still occur, slipping past multiple levels...
Have you ever googled yourself? Were you happy with what came up? If not, consider requesting the...