A recent report by the Trellix Advanced Research Center has exposed a highly advanced malware campaign, dubbed “OneClik,” which leverages Microsoft ClickOnce technology to execute malicious payloads on targeted systems.
The attackers specifically focus on the energy, oil, and gas sector, using phishing emails...
A recent investigation has revealed a highly sophisticated spearphishing campaign in which North Korean hackers used GitHub, a prominent code-hosting platform, as a key part of their attack infrastructure.
The campaign, linked to the notorious DPRK-nexus threat group Kimsuky, demonstrates the evolving tactics of...
Cybercriminals are leveraging a sophisticated malware campaign dubbed Shadow Vector, which has been uncovered by the Acronis Threat Research Unit (TRU).
This operation targets users in Colombia by distributing what appear to be urgent court notifications via email.
The malicious emails carry SVG (Scalable Vector Graphics) file...
A recent investigation by cybersecurity experts at Field Effect Analysis has uncovered a targeted cyberattack leveraging the popular Zoom video conferencing platform as a vector for infostealer malware.
This sophisticated campaign is attributed to BlueNoroff, a North Korean state-sponsored hacking group, known for its...
In a significant cybersecurity alert, the UK's National Cyber Security Centre (NCSC) has released a detailed report warning of a newly identified malware threat dubbed "UMBRELLA STAND."
The malware is actively targeting internet-facing Fortinet FortiGate 100D series firewalls, using sophisticated techniques to breach, persist,...
Security researchers at Seqrite Labs have uncovered a new wave of sophisticated cyberattacks where cybercriminals utilize encoded VBScript (.VBE) files as the initial infection vector for deploying the Masslogger credential stealer malware.
This campaign exemplifies the evolving threat landscape, with attackers leveraging advanced, multi-stage, fileless...