A distributed denial of service (DDoS) attack is when an attacker disrupts the delivery of a service, typically by flooding a system with requests for data. They have been part of the criminal toolbox for over twenty years, and they’re only growing...
Two suspects were arrested by Belgian police and servers shut down after a coordinated investigation of transnational malware first tracked in the Netherlands.
The Latrodectus malware loader stepped in to fill the void left by the disruption of major malware distribution botnets such as IcedID. Here’s how it’s being used and how it operates.
Red team tool EDRSilencer has been used by hackers to make the Windows Filtering Platform block a long list of EDR products from communicating with their management consoles and reporting malware detections.
Das Open-Source-Ökosystem hat 2024 einen starken Anstieg bösartiger Softwarekomponenten erlebt. Das Risiko für Angriffe auf die Software-Lieferkette steigt.
The open-source development ecosystem has experienced a significant rise in malicious software components, putting enterprises on high alert for software supply chain attacks.
New phishing campaigns attempt to evade detection by constructing rogue QR codes with special ASCII characters and load phishing pages locally using the local blob URL feature in browsers.
The cyberespionage group has deployed two distinct toolsets for breaching air-gapped networks, demonstrating keen awareness of segmentation used by its targets.
Sponsored Links