top of page


Beware: 1,000+ Fake Cryptocurrency Sites Trap Users in Bogus Rewards Scheme
A previously undetected cryptocurrency scam has leveraged a constellation of over 1,000 fraudulent websites to ensnare users into a bogus...
Sergiu Marias
Jun 13, 20233 min read
Â
Â
Â


Asylum Ambuscade: A Cybercrime Group with Espionage Ambitions
The threat actor known as Asylum Ambuscade has been observed straddling cybercrime and cyber espionage operations since at least early...
Sergiu Marias
Jun 12, 20232 min read
Â
Â
Â


Experts Unveil Exploit for Recent Windows Vulnerability Under Active Exploitation
Details have emerged about a now-patched actively exploited security flaw in Microsoft Windows that could be abused by a threat actor to...
Sergiu Marias
Jun 9, 20231 min read
Â
Â
Â


Winning the Mind Game: The Role of the Ransomware Negotiator
Get exclusive insights from a real ransomware negotiator who shares authentic stories from network hostage situations and how he managed...
Sergiu Marias
Jun 8, 20234 min read
Â
Â
Â


How Many Cyber Attacks Happen per Day in 2023?
Here is a sneak peek to get a good grasp on the state of cyber attack statistics worldwide. By 2025, cybercrime will cost the world $10.5...
Sergiu Marias
Jun 7, 202310 min read
Â
Â
Â


New Malware Campaign Leveraging Satacom Downloader to Steal Cryptocurrency
A recent malware campaign has been found to leverage Satacom downloader as a conduit to deploy stealthy malware capable of siphoning...
Sergiu Marias
Jun 7, 20233 min read
Â
Â
Â


Cyclops Ransomware Gang Offers Go-Based Info Stealer to Cybercriminals
Threat actors associated with the Cyclops ransomware have been observed offering an information stealer malware that's designed to...
Stefan Epistatu
Jun 6, 20231 min read
Â
Â
Â


Don't Click That ZIP File! Phishers Weaponizing .ZIP Domains to Trick Victims
A new phishing technique called "file archiver in the browser" can be leveraged to "emulate" a file archiver software in a web browser...
Stefan Epistatu
Jun 6, 20233 min read
Â
Â
Â


The impact of the war in Ukraine on cyberthreats
Russia’s war on Ukraine has influenced the cyber sphere in many ways. Cyber operations are used alongside traditional military action....
Stefan Epistatu
Jun 4, 20231 min read
Â
Â
Â


New BrutePrint Attack Lets Attackers Unlock Smartphones with Fingerprint Brute-Force
Researchers have discovered an inexpensive attack technique that could be leveraged to brute-force fingerprints on smartphones to bypass...
-
May 30, 20233 min read
Â
Â
Â


Security Defects in TPM 2.0 Spec Raise Alarm
Security researchers at Quarkslab have identified a pair of serious security defects in the Trusted Platform Module (TPM) 2.0 reference...
Stefan Epistatu
Mar 1, 20233 min read
Â
Â
Â


Cyberattacks hit data centers to steal information from global companies
A malicious campaign against data centers stole the access credentials of some of the world's biggest companies — including Amazon,...
Stefan Epistatu
Feb 25, 20234 min read
Â
Â
Â
bottom of page
