top of page


Ransomware Hackers and Scammers Utilizing Cloud Mining to Launder Cryptocurrency
Ransomware actors and cryptocurrency scammers have joined nation-state actors in abusing cloud mining services to launder digital assets,...
Sergiu Marias
Jun 16, 20232 min read


Chinese Hackers Exploit VMware Zero-Day to Backdoor Windows and Linux Systems
The Chinese state-sponsored group known as UNC3886 has been found to exploit a zero-day flaw in VMware ESXi hosts to backdoor Windows and...
Sergiu Marias
Jun 15, 20232 min read


Over Half of Security Leaders Lack Confidence in Protecting App Secrets, Study Reveals
It might come as a surprise, but secrets management has become the elephant in the AppSec room. While security vulnerabilities like...
Sergiu Marias
Jun 14, 20234 min read


Beware: 1,000+ Fake Cryptocurrency Sites Trap Users in Bogus Rewards Scheme
A previously undetected cryptocurrency scam has leveraged a constellation of over 1,000 fraudulent websites to ensnare users into a bogus...
Sergiu Marias
Jun 13, 20233 min read


Asylum Ambuscade: A Cybercrime Group with Espionage Ambitions
The threat actor known as Asylum Ambuscade has been observed straddling cybercrime and cyber espionage operations since at least early...
Sergiu Marias
Jun 12, 20232 min read


Experts Unveil Exploit for Recent Windows Vulnerability Under Active Exploitation
Details have emerged about a now-patched actively exploited security flaw in Microsoft Windows that could be abused by a threat actor to...
Sergiu Marias
Jun 9, 20231 min read


Winning the Mind Game: The Role of the Ransomware Negotiator
Get exclusive insights from a real ransomware negotiator who shares authentic stories from network hostage situations and how he managed...
Sergiu Marias
Jun 8, 20234 min read


How Many Cyber Attacks Happen per Day in 2023?
Here is a sneak peek to get a good grasp on the state of cyber attack statistics worldwide. By 2025, cybercrime will cost the world $10.5...
Sergiu Marias
Jun 7, 202310 min read


New Malware Campaign Leveraging Satacom Downloader to Steal Cryptocurrency
A recent malware campaign has been found to leverage Satacom downloader as a conduit to deploy stealthy malware capable of siphoning...
Sergiu Marias
Jun 7, 20233 min read


Cyclops Ransomware Gang Offers Go-Based Info Stealer to Cybercriminals
Threat actors associated with the Cyclops ransomware have been observed offering an information stealer malware that's designed to...
Stefan Epistatu
Jun 6, 20231 min read


Don't Click That ZIP File! Phishers Weaponizing .ZIP Domains to Trick Victims
A new phishing technique called "file archiver in the browser" can be leveraged to "emulate" a file archiver software in a web browser...
Stefan Epistatu
Jun 6, 20233 min read


The impact of the war in Ukraine on cyberthreats
Russia’s war on Ukraine has influenced the cyber sphere in many ways. Cyber operations are used alongside traditional military action....
Stefan Epistatu
Jun 4, 20231 min read


New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force
Researchers have discovered an inexpensive attack technique that could be leveraged to brute-force fingerprints on smartphones to bypass...
-
May 30, 20233 min read


Security Defects in TPM 2.0 Spec Raise Alarm
Security researchers at Quarkslab have identified a pair of serious security defects in the Trusted Platform Module (TPM) 2.0 reference...
Stefan Epistatu
Mar 1, 20233 min read


Cyberattacks hit data centers to steal information from global companies
A malicious campaign against data centers stole the access credentials of some of the world's biggest companies — including Amazon,...
Stefan Epistatu
Feb 25, 20234 min read
bottom of page
