In a recent development that underscores the evolving landscape of cybersecurity threats, reports have …
Category:
Threat Intelligence
-
-
CybersecurityIT securitySupply Chain SecurityThreat Intelligence
PlushDaemon APT Targets South Korean VPN Provider in Supply Chain Attack
by Nia Walkerby Nia Walker 2 minutes readIn a recent cybersecurity revelation, a new threat has emerged on the horizon. PlushDaemon, …
-
CybersecurityMalware AnalysisThreat Intelligence
PNGPlug Loader Delivers ValleyRAT Malware Through Fake Software Installers
by Jamal Richaqrds 2 minutes readIn the ever-evolving landscape of cybersecurity threats, a concerning development has emerged targeting Chinese-speaking …
-
CybersecurityDigital SecurityThreat Intelligence
Russian Star Blizzard Shifts Tactics to Exploit WhatsApp QR Codes for Credential Harvesting
by David Chenby David Chen 2 minutes readIn a concerning turn of events, the notorious Russian threat actor, Star Blizzard, has …
-
CybersecurityIT securityThreat Intelligence
Hackers Hide Malware in Images to Deploy VIP Keylogger and 0bj3ctivity Stealer
by David Chenby David Chen 3 minutes readIn a concerning trend observed by cybersecurity experts, hackers are resorting to a stealthy …
-
Collaboration in RetailCybersecurityIT and Software DevelopmentThreat Intelligence
North Korea’s Lazarus APT Evolves Developer-Recruitment Attacks
by David Chenby David Chen 2 minutes readIn the ever-evolving landscape of cybersecurity threats, the Lazarus Advanced Persistent Threat (APT) group …
-
CybersecurityDigital Asset ManagementThreat Intelligence
Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems
by David Chenby David Chen 2 minutes readIn a recent cybersecurity revelation, over 4,000 unique web backdoors, initially deployed by a …