Researchers from Unit 42 discovered a Mirai version known as IZ1H9 that exploited many vulnerabilities in order to propagate itself. The following vulnerabilities are exploited by the threat actors to
PingPull is a piece of malware that targets Linux computers and is employed by the Chinese advanced persistent threat (APT) organization known as Alloy Taurus. Researchers from Unit 42 have
Researchers from multiple security companies have reported that a massive supply chain attack on users of 3CX, a widely utilized voice and video calling desktop client, was carried out by
Throughout the course of the investigation by researchers, a total of twenty distinct spam campaigns were found to have been directed against the countries of Chile, Mexico, Peru, and Portugal.
Dero is a relatively new cryptocurrency that places a strong emphasis on privacy. It utilizes directed acyclic graph (DAG) technology, which allows it to make the claim that its transactions
This week, federal authorities in Los Angeles seized an internet domain that was being used to sell malicious software for computers. This software allowed cybercriminals to take control of infected
From the beginning of their existence, criminals have been abusing social networks, which have come to occupy an increasingly substantial piece of each of our lives. Threat actors may extract