A suspected nation-state threat actor has been linked to the distribution of a new malware called Airstalk as part of a ...
A suspicious Visual Studio Code extension with file-encrypting and data-stealing behavior successfully bypassed marketplace ...
Researchers have sinkholed a command and control server for a variant of the PlugX malware and observed in six months more than 2.5 million connections from unique IP addresses. Since last September, ...
Google's Threat Intelligence Group (GTIG) has identified a major shift this year, with adversaries leveraging artificial intelligence to deploy new malware families that integrate large language ...
Are you importing indicators of compromise (IOC) in the form of domain names and IP addresses into your SIEM, NDR or IDS? If ...
During every quarter last year, between 10% and 16% of organizations had DNS traffic originating on their networks towards command-and-control (C2) servers associated with known botnets and various ...
The Chaos malware, as reported by the Black Lotus Lab from Lumen, is able to work on different architectures: ARM, Intel (i386), MIPS and PowerPC, providing DDoS services, cryptocurrency mining and ...
A new malware strain that has been landing on systems belonging to organizations in the US, Europe, Turkey, and India has provided another indication of how Iran's state-backed cyber-threat groups ...
A novel cyber campaign by Russian speaking actors abused legitimate internet services, such as GitHub and FileZilla, to deploy multiple malware variants, Recorded Future has reported. The adaptive ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results