Malicious Software Infrastructure Easier to Get and Deploy Than Ever
Simple to use and deploy offensive security tools, making it easier than ever for criminals with little technical know-how to get in on …
Simple to use and deploy offensive security tools, making it easier than ever for criminals with little technical know-how to get in on …
More information has come to light about the Sunburst backdoor that could help defenders get a better handle on the scope of the sprawling …
The e-commerce card-skimming landscape has a new wrinkle: Cybercriminals affiliated with the Magecart collective are using encrypted …
The U.S. government is warning of new malware, dubbed Drovorub, that targets Linux …
In this in-depth Threatpost podcast Christoph Hebeisen, who leads the Security Intelligence Research Division at Lookout, shares a …
April 24, 2012 – The fight against malware is a cat-and-mouse game. It is constant and constantly …
Hackers-Hack-Hackers: Russian APT group Turla known as Waterbug compromised the Iranian hacker’s command and control server …
Hackers-Hack-Hackers: Russian APT group Turla known as Waterbug compromised the Iranian hacker’s command and control server …
Researchers discovered a new trojan Masad Stealer to deliver the powerful spyware on the targeted systems and exfiltrate the stolen data …
A freshly discovered commercial spyware dubbed the “Masad Clipper and Stealer” is using Telegram bots as its command-and-control (C2) …
The Panda threat group, best known for launching the widespread and successful 2018 “MassMiner” cryptomining malware campaign, has …
Cybercriminals abusing Facebook and YouTube profiles to host the Astaroth malware that launches through sophisticated phishing campaign to …