Moldovan authorities have detained a 45-year-old individual linked to the DoppelPaymer ransomware group, which targeted Dutch organizations...
Post-Exploitation
Harrods, the luxury department store, confirmed a cyberattack on May 1, 2025, restricting internal internet access while...
A modified version of the encrypted messaging app Signal, used by Trump administration officials, was compromised in...
Cybersecurity researchers from Hunt have identified a server hosting advanced malicious tools, including SuperShell command-and-control (C2) payloads...
Hitachi Vantara, the data infrastructure subsidiary of Japanese conglomerate Hitachi, executed emergency containment measures on April 26,...
Cybersecurity researchers have uncovered a publicly accessible server operated by an affiliate of the Fog ransomware group,...
An alleged operator of the SmokeLoader malware, identified as Nicholas Moses (alias “scrublord”), is facing federal hacking...
Cybersecurity firm Arctic Wolf has confirmed that a remote code execution (RCE) vulnerability in SonicWall Secure Mobile...
The Diamond Ticket attack represents an advanced exploitation technique targeting Active Directory environments by manipulating Kerberos authentication...
Active Directory (AD) remains a prime target for attackers due to its central role in enterprise authentication...
Ransom.Win32.MAOLOA.THAAHBA is a targeted ransomware variant affecting Windows systems, first observed in January 2021. While classified as...
TrojanSpy.MSIL.REDLINESTEALER.YXBDM represents a sophisticated information-stealing malware targeting Windows systems, first identified by Trend Micro researchers in April...
A newly identified threat, Trojan.W97M.CVE202140444.A, exploits a critical Microsoft Office vulnerability (CVE-2021-40444) to execute remote code through...
Ransom.Win64.CONTI.AA, a variant of the notorious Conti ransomware family, remains a significant threat to Windows systems despite...
A new tool called Imperius has emerged, designed to detect and expose Linux Kernel Module (LKM) rootkits...
DNS Over HTTPS Beacon The new DoH implementation blends DNS C2 with legitimate web traffic: Default configuration...