Malware Disguised as Game Cheats and Benign Apps
How Camouflage, Not Complexity, Sustains Long-Lived Malware Campaigns One of the most persistent malware delivery techniques relies not on zero-day exploits or advanced intrusion methods, Read More
How Camouflage, Not Complexity, Sustains Long-Lived Malware Campaigns One of the most persistent malware delivery techniques relies not on zero-day exploits or advanced intrusion methods, Read More
Stealthy Information Stealers Leveraging Trusted Platforms and Non-Traditional Execution Methods Modern information-stealing malware continues to evolve toward greater stealth, flexibility, and abuse of trust. One Read More
How Organizations Are Being Compromised Without Touching the Endpoint Attackers are increasingly making use of networkless attack techniques that target cloud applications and digital identities, Read More
The introduction of Open AI’s ChatGPT was a defining moment for the software industry, touching off a GenAI race with its November 2022 release. SaaS Read More
FISA reauthorization heads to Biden’s desk after Senate passage Legislation to extend potent surveillance authorities won the precise number of votes it needed for passage Read More
Technology, research, and government sectors in the Asia-Pacific region have been targeted by a threat actor called BlackTech as part of a recent cyber attack Read More
Government entities in the Middle East have been targeted as part of a previously undocumented campaign to deliver a new backdoor dubbed CR4T. Russian cybersecurity Read More
To minimize the risk of privilege misuse, a trend in the privileged access management (PAM) solution market involves implementing just-in-time (JIT) privileged access. This approach Read More
Users of the CrushFTP enterprise file transfer software are being urged to update to the latest version following the discovery of a security flaw that Read More
A new Google malvertising campaign is leveraging a cluster of domains mimicking a legitimate IP scanner software to deliver a previously unknown backdoor dubbed MadMxShell Read More