Cybersecurity researchers have uncovered a sophisticated attack campaign by the UNC2891 threat group that used physical hardware installation and advanced anti-forensics techniques to target banking infrastructure.
The financially motivated attackers deployed a previously undocumented method now recognized in the MITRE ATT&CK framework as T1564.013,...
Cybersecurity researchers have identified a sophisticated new infection chain employed by the GOLD BLADE cybercriminal group, also known as RedCurl, Red Wolf, and Earth Kapre, targeting human resources personnel through weaponized resume documents.
The financially motivated threat actors have combined previously observed techniques to create...
Cybersecurity researchers have identified a new campaign distributing the sophisticated VIP Keylogger malware through an evolved attack methodology that leverages AutoIt-based injection techniques.
Unlike previous iterations that relied on steganography, this campaign employs process hollowing and memory-based execution to evade traditional antivirus solutions while...
Cybersecurity researchers have unveiled sophisticated tactics employed by North Korean operatives who pose as legitimate remote workers to infiltrate organizations worldwide, siphoning at least $88 million USD to fund the DPRK's weapons programs.
A recent Flashpoint intelligence report exposes the alarming sophistication of these multi-year...
Cybersecurity researchers have successfully demonstrated how Large Language Model (LLM)-powered honeypots can effectively deceive threat actors into revealing their attack methodologies and infrastructure.
Using the Beelzebub honeypot framework, security analysts captured a complete attack sequence that led to the discovery and subsequent shutdown of...
A sophisticated global cyberattack exploiting critical vulnerabilities in Microsoft SharePoint servers has compromised approximately 400 entities worldwide, with significant impact across South African government agencies, corporations, and educational institutions.
The breach, initially detected by Dutch cybersecurity firm Eye Security, represents one of the most...