Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT MalwareA phishing campaign is spreading a fileless variant of Remcos RAT, allowing attackers to control compromised computers and extract sensitive data.
Ransomware Trends: Most Attacks Hit Between 1am and 5am, Study FindsRansomware attacks are increasingly occurring during off-hours, mainly between 1 a.m. and 5 a.m., indicating a vulnerability for many organizations.
Chinese Hackers Exploit Zero-Day Cisco Switch Flaw to Gain System ControlA China-nexus threat group exploited a Cisco zero-day flaw to gain control of switches, demonstrating advanced evasion tactics and persistence in cyber espionage.
Beware: Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry AttacksA new malware campaign uses fake CAPTCHA checks to deliver the Lumma information stealer, targeting multiple industries globally.
Compromised DNC credentials found on Telegram bot, cyber firm saysTelegram bot collects Democratic Party credentials, threatening security before DNC convention.
Report: Healthcare ransomware targets are shiftingRansomware groups are increasingly targeting healthcare institutions due to their vulnerabilities and potential for high ransom payouts.
Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT MalwareA phishing campaign is spreading a fileless variant of Remcos RAT, allowing attackers to control compromised computers and extract sensitive data.
Ransomware Trends: Most Attacks Hit Between 1am and 5am, Study FindsRansomware attacks are increasingly occurring during off-hours, mainly between 1 a.m. and 5 a.m., indicating a vulnerability for many organizations.
Chinese Hackers Exploit Zero-Day Cisco Switch Flaw to Gain System ControlA China-nexus threat group exploited a Cisco zero-day flaw to gain control of switches, demonstrating advanced evasion tactics and persistence in cyber espionage.
Beware: Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry AttacksA new malware campaign uses fake CAPTCHA checks to deliver the Lumma information stealer, targeting multiple industries globally.
Compromised DNC credentials found on Telegram bot, cyber firm saysTelegram bot collects Democratic Party credentials, threatening security before DNC convention.
Report: Healthcare ransomware targets are shiftingRansomware groups are increasingly targeting healthcare institutions due to their vulnerabilities and potential for high ransom payouts.
State Papers: Threat by shadowy republican group to poison British water supply with weedkillerBritish authorities took a contamination threat by the Republican Revenge Group seriously, detailing a plan to poison water supplies.
Found on VirusTotal: The world's first UEFI bootkit for LinuxBootkitty's discovery signals an emerging UEFI threat landscape for Linux, challenging prior assumptions about bootkits being exclusive to Windows.
Report Details Interview of Georgia Suspect in Prior School Shooting ThreatAnonymous tips warned of threats on Discord linked to a 13-year-old; he later shot two students and two teachers at his school.
Automated Security Validation: One (Very Important) Part of a Complete CTEM FrameworkCombining ASV and CTEM can empower security teams for more informed decisions.
Microsoft GM on AI and elections: 'There will be fakes'Trolls will use AI to influence elections, with simple manipulations being effectiveAI audio lacks contextual clues, making it difficult for the audience to evaluate