One Year Later Rhadamanthys Is Still Dropped Via Malvertising
It was just a little over a year ago that the Rhadamanthys stealer was first publicly seen distributed via malicious...
It was just a little over a year ago that the Rhadamanthys stealer was first publicly seen distributed via malicious...
For many households, energy costs represent a significant part of their overall budget. And when customers want to discuss their...
Remote Monitoring & Management (RMM) software, including popular tools like AnyDesk, Atera, and Splashtop, are invaluable for IT administrators today,...
In late January 2024, the ThreatDown Managed Detection and Response (MDR) team found and stopped a three-month long malware campaign...
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
Malware loaders (also known as droppers or downloaders) are a popular commodity in the criminal underground. Their primary function is...
In early 2024, a large K-12 school district partnered with ThreatDown MDR to strengthen its cybersecurity posture. Shortly after onboarding,...
A new type of malware is being used by ransomware gangs in their attacks, and its name is PikaBot. A...
February was a particularly busy month for search-based malvertising with the number of incidents we documented almost doubling. We saw...
The Python Package Index (PyPI) has temporarily suspended user registration and the creation of new projects to deal with an...
Cisco has shared a set of recommendations for customers to mitigate password-spraying attacks that have been targeting Remote Access VPN...
If your job involves keeping applications or data secure, you know how important penetration testing can be in identifying potential...
A vulnerability in the wall command of the util-linux package that is part of the Linux operating system could allow an unprivileged...
Image: Midjourney American retailer Hot Topic disclosed that two waves of credential stuffing attacks in November exposed affected customers' personal...
Security researchers have disclosed a vulnerability (CVE-2024-2169) affecting implementations of User Datagram Protocol (UDP).Successful exploitation of the vulnerability could allow...
CISA warns that attackers are now exploiting a Microsoft SharePoint code injection vulnerability that can be chained with a critical privilege...
Google's Threat Analysis Group (TAG) and Google subsidiary Mandiant said they've observed a significant increase in the number of zero-day...
The INC Ransom extortion gang is threatening to publish three terabytes of data allegedly stolen after breaching the National Health Service...
Ransomware is changing, fast. The past three months have seen dramatic developments among the ransomware ecosystem to include the takedown...
A new phishing-as-a-service (PhaaS) named ‘Darcula’ uses 20,000 domains to spoof brands and steal credentials from Android and iPhone users...
Google fixed seven security vulnerabilities in the Chrome web browser on Tuesday, including two zero-days exploited during the Pwn2Own Vancouver...
Updated Source and Related Links.CVE-2023-24955 vulnerability is exploited in the wild. In a network-based attack, an authenticated attacker as a Site...
There are reports of an ongoing malware campaign, Sign1, targeting WordPress sites. The campaign entails attackers gaining access to WordPress...
Over 15 free VPN apps on Google Play were found using a malicious software development kit that turned Android devices...