More Stories
Attackers Use Fake CAPTCHAs to Deploy Lumma Stealer RAT
Attackers are exploiting user familiarity with CAPTCHAs to distribute the Lumma Stealer RAT via malicious PowerShell commands, according to HP...
Active Lumma Stealer Campaign Impacting U.S. SLTTs
The CIS CTI team spotted a Lumma Stealer campaign where SLTT victims were redirected to malicious webpages delivering fake CAPTCHA...
BlackLock ransomware: What you need to know
BlackLock has become a big deal, very quickly. It has been predicted to be one of the biggest ransomware-as-a-service operations...
FishMonger APT Group Linked to I-SOON in Espionage Campaigns
The FishMonger APT Group has been linked with I-SOON, targeting governments, NGOs and think tanks in cyber-espionage campaigns Read More
Critical GitHub Attack
This is serious: A sophisticated cascading supply chain attack has compromised multiple GitHub Actions, exposing critical CI/CD secrets across tens...
Rooted Devices 250 Times More Vulnerable to Compromise
Rooted devices are 250 times more vulnerable to security incidents, Zimperium warned Read More