Fronton botnet has far more ability than launching DDOS attack, can track social media trends and launch suitable propaganda.
Microsoft Word also leveraged in the email campaign, which uses a 22-year-old Office RCE bug.
The U.S. Department of Justice indites middle-aged doctor, accusing him of being a malware mastermind.
Researchers say a GitHub proof-of-concept exploitation of recently announced VMware bugs is being abused by hackers in the wild.
An account promoting the project—which offers a range of threat activity from info-stealing to crypto-mining to ransomware as individual modules—has more than 500 subscribers.
Researchers discovered a simple malware builder designed to steal credentials, then pinging them to Discord webhooks.
The stealthy, feature-rich malware has multistage evasion tactics to fly under the radar of security analysis, researchers at Proofpoint have found.
Why a private college that stayed in business for 157 years had to close after the combo of COVID-19 and ransomware proved too much.
The threat group has leaked data that it claims was stolen in the breach and is promising more government-targeted attacks.
Researchers say a hacker is selling access to quality malware for chump change.
Activity dubbed ‘Raspberry Robin’ uses Microsoft Standard Installer and other legitimate processes to communicate with threat actors and execute nefarious commands.
A sophisticated campaign utilizes a novel anti-detection method.
The Botnet appears to use a new delivery method for compromising Windows systems after Microsoft disables VBA macros by default.
A full 89 percent of organizations experienced one or more successful email breaches during the previous 12 months, translating into big-time costs.
Citizen Lab uncovers multi-year campaign targeting autonomous region of Spain, called Catalonia.
Fortinet’s Derek Manky discusses the exponential increase in the speed that attackers weaponize fresh vulnerabilities, where botnets and offensive automation fit in, and the ramifications for security teams.
Connections that show the cybercriminal teams are working together signal shifts in their respective tactics and an expansion of opportunities to target victims.
Threat actors have developed custom modules to compromise various ICS devices as well as Windows workstations that pose an imminent threat, particularly to energy providers.
Accounting materials from the Italy-based luxury fashion house were leaked online by RansomExx because the company refused to pay.
The APT28 (Advanced persistence threat) is operating since 2009, this group has worked under different names such as Sofacy, Sednit, Strontium Storm, Fancy Bear, Iron Twilight, and Pawn.