Your browser does not seem to support JavaScript. As a result, your viewing experience will be diminished, and you have been placed in read-only mode.
Please download a browser that supports JavaScript, or enable it if it's disabled (i.e. NoScript).
The credential-stealing trash panda is using the chat app to store and update C2 addresses as crooks find creative new ways to distribute the malware.
https://threatpost.com/raccoon-stealer-telegram/178881/
Google removed six different malicious Android applications targeting mainly users in the U.K. and Italy that were installed about 15,000 times.
https://threatpost.com/google-play-bitten-sharkbot/179252/
The bold move signals a looming clash between Russian ransomware groups and the U.S.
https://threatpost.com/groove-ransomware-revil-revenge-us-cyberattacks/175726/
QNAP is warning clients that a recently disclosed vulnerability affects most of its NAS devices, with no mitigation available while the vendor readies a patch.
https://threatpost.com/qnap-customers-adrift-fix-openssl-bug/179197/