Kaspersky has seen the use of malicious DLLs as an attack vector double over the last two years. Malicious DLLs allow attackers to execute other malicious actions on a target machine. Kaspersky was ...
Security firm Arctic Wolf attributed the espionage campaign to UNC6384 (aka Mustang Panda, Twill Typhoon), and in research ...
Volexity has linked spear phishing operations to China-aligned UTA0388 in new campaigns using advanced tactics and LLMs ...
Instead of relying on more traditional methods, the backdoor exploits OpenAI’s Assistants API for command-and-control communications ...
A new unofficial pack for WWE 2K25 lets fans bring a familiar Saturday Night Main Event look to the game—available now for PC ...
AttackIQ presents the fifth volume of Ransom Tales, an initiative focused on emulating the Tactics, Techniques, and ...
A threat actor has abused the OpenAI Assistants API as a communication mechanism between its C&C server and a stealthy ...
The group is abusing trusted remote management and file transfer tools to deliver a Linux encryptor on Windows machines.
Wazuh provides ransomware protection and file recovery on monitored Windows endpoints using its command module and the ...
Cybersecurity, Cyber Espionage, Malware, PlugX, Data Breach, Vulnerability, Phishing, European Union, Threat Intelligence ...
Chinese threat actor exploiting an unpatched Windows shortcut vulnerability in fresh attacks targeting the diplomatic ...
The latest phase of Operation Dreamjob is targeting European defense and UAV firms through fake job offers and trojanized ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results