Email Campaign Spreads StrRAT Fake-Ransomware RAT | Threatpost
An email campaign is delivering a Java-based remote access trojan (RAT) that can not only steal credentials and take control of systems, but also presents Read More
An email campaign is delivering a Java-based remote access trojan (RAT) that can not only steal credentials and take control of systems, but also presents Read More
The recent DarkSide cyberattack on Colonial Pipeline truly brought to light the risk ransomware can pose to a national industrial infrastructure. High-profile attacks like this Read More
As businesses strive to move faster and faster, many are adopting a “just-in-time” strategy of spinning up human resources on demand – a phenomenon known Read More
Apple is using the growing threat of malware on its Mac platform as a defense in a lawsuit that could force the company to open Read More
Another day, another incident of internet-of-things (IoT) gadgets falling flat on their faces and spilling users’ privacy, if not getting hooked into a botnet, used Read More
A researcher has released a proof-of-concept (PoC) exploit for CVE-2021-31166, a use-after-free, highly critical vulnerability in the HTTP protocol stack (http.sys) that could lead to Read More
A recently developed botnet named “Simps” has emerged from the cyber-underground to carry out distributed denial-of-service (DDoS) attacks on gaming targets and others, using internet Read More
Google updated its May 3 Android security bulletin on Wednesday to say that there are “indications” that four of the 50 vulnerabilities “may be under Read More
Owners of Eufy home security cameras were warned this week of an internal server bug that allowed strangers to view, pan and zoom in on Read More
Clearly, the months since the world shut down in March of 2020 fomented a radical shift in how people work and live, and it’s brought Read More