Cybercriminals are taking advantage of the death of Queen Elizabeth II to launch phishing attacks, specifically these scammers directing users to malicious pages that are designed to steal Microsoft credentials.
Microsoft’s threat intelligence team claims that the DEV-0270 group (also known as Nemesis Kitten or Phosphorus) has been abusing Windows’ BitLocker feature in its attacks and using it to encrypt
A new stealthy Linux malware known as Shikitega that infects computers and IoT devices via a series of payloads. The malware makes use of privilege elevation, adds persistence on the
A Turkish entity going by the name of Nitrokod has been accused of running a campaign by spoofing a desktop version of Google Translate to actively mine cryptocurrency from its
Threat actors associated with the Cuba ransomware have been linked to previously undocumented tactics, techniques, and procedures (TTPs), including a new remote access Trojan called ROMCOM RAT on compromised systems.
Hackers are constantly looking for new ways to attack and infect PC users. And, for this, there is nothing better than taking advantage of the programs or services that are
It is well known that the volume of security incidents has not stopped growing steadily for some years now. The cybercrime industry is experiencing a golden age that, unfortunately, shows
Researchers have identified a malicious campaign using Alibaba Cloud’s Object Storage Service (OSS) (also known as Aliyun) for malware distribution and illicit cryptocurrency mining activities using steganography. OSS is a
Previously undetected malware called Lightning Framework that targets Linux systems can be used as a backdoor using SSH and deploy rootkits to cover the tracks of attackers. Described as a