Source Link A sophisticated rootkit that’s able to insert itself into the lowest levels…
Lucian Constantin
-
-
Network SecuritySecurity
Office 365 phishing campaign that can bypass MFA targets 10,000 organizations
Source Link Security researchers from Microsoft have uncovered a large-scale phishing campaign that uses…
-
Source Link Security researchers have recently identified several attack campaigns that use APT-like targeting…
-
Source Link A targeted attack campaign has been compromising home and small-business routers since…
-
Source Link LockBit is one of the most prominent ransomware-as-a-service (RaaS) operations that has…
-
Source Link Researchers from Kaspersky Lab have published an analysis of a previously undocumented…
-
Cloud SecuritySecurity
Ransomware could target OneDrive and SharePoint files by abusing versioning configurations
Source Link Researchers warn that documents hosted in the cloud might not be out…
-
Source Link Researchers warn of a new worm that’s infecting Linux servers by brute-forcing…
-
Source Link Researchers have come across a stealthy Linux backdoor that uses sophisticated techniques…
-
Source Link The Chaos ransomware builder started out last year as a buggy and…