Previously limited to initial access brokering, the Gootloader group has pivoted to a nasty post-compromise "GootBot" attack, each implant with its own C2.
Read moreVirtual Kidnapping: AI Tools Are Enabling IRL Extortion Scams
November 7 2023With AI and publicly available data, cybercriminals have the resources they need to fake a real-life kidnapping and make you believe it.
Read moreNovel Google Cloud RAT Uses Calendar Events for C2
November 7 2023Cybercriminals are abusing legitimate functions within cloud services, and providers can't totally stop them, especially when it comes to innovative approaches like this.
Read moreUS Sanctions Ryuk Ransomware’s Russian Money Launderer
November 7 2023Woman is accused of assisting Russian oligarchs and ransomware affiliates with schemes to evade sanctions.
Read moreName That Edge Toon: Out for the Count
November 7 2023Come up with a clever cybersecurity-related caption, and our panel of experts will reward the winner with a $25 Amazon gift card.
Read moreMiddle East’s 5G Acceleration May Pose Serious Security Issues
November 7 2023Telcos across the Middle East are rapidly rolling out 5G networks. Will this accelerated adoption lead to higher security vulnerabilities?
Read moreMeet Your New Cybersecurity Auditor: Your Insurer
November 6 2023As cyber insurance gets more expensive and competitive, security decision-makers have actionable opportunities to strengthen their cyber defenses.
Read moreCrashing iPhones with a Flipper Zero
November 6 2023The Flipper Zero is an incredibly versatile hacking device. Now it can be used to crash iPhones in its vicinity by sending them a never-ending stream of pop-ups.
These...
Read more
Recent Comments