Keyloggers Turn to Zoho Office Suite in Droves for Data Exfiltration
An extremely high number of keylogger phishing campaigns have been seen tied to the Zoho online office suite software; in an analysis, a full 40 Read More
An extremely high number of keylogger phishing campaigns have been seen tied to the Zoho online office suite software; in an analysis, a full 40 Read More
The Reaper APT group, suspected of being affiliated with North Korea, turns out to have a link to the recently uncovered NOKKI malware family. Palo Read More
Google patched six critical remote code execution flaws in its Android operating system as part of its October Android Security Bulletin. Four of those remote Read More
A design issue in the way some popular password manager tools verify legitimate Android apps could be harnessed to help attackers launch successful phishing attacks Read More
The castle walls, moat and drawbridge have been overrun. It is obvious to all of us – the use of perimeter defense as the key Read More
Python was recently touted as on track to become the world’s most prevalent coding language, looking to swallow, as it were, the majority of the Read More
As the number of open source components used in software supply chains shoot up, hackers are going along for the ride. Increasingly threat actors are Read More