ESET researchers have observed a cluster of North Korea-aligned activities that they named DeceptiveDevelopment and where its ...
Winnti’s RevivalStone campaign exploited an ERP SQL flaw to deploy upgraded malware, breaching an MSP and infecting multiple ...
CISOs have yet another attack vector to worry about with the discovery of a new family of data-stealing malware that uses ...
OpenSSH has released security updates addressing two vulnerabilities, a man-in-the-middle (MitM) and a denial of service flaw ...
A new malware called FinalDraft has been using Outlook email drafts for command-and-control communication in attacks against ...
They opted for the “fake update” distribution method, where victims would visit a compromised website which would serve a ...
A newly identified malware family abuses the Outlook mail service for communication, via the Microsoft Graph API.
The risks of using Linux-based software are often overlooked due to its reputation for security, stability, and open-source ...
The trojan has been used in attacks since mid-November 2024 to infect and remotely control systems and exfiltrate data such ...
REF7707 deployed FINALDRAFT malware, using Microsoft Graph API for stealthy command-and-control in a global espionage ...