An Iranian-backed hacking group called Fox Kitten has been linked with a ransomware named Pay2Key that has been targeting organizations in Israel and Brazil. According to experts, this parti... Read more
A popular open-source cryptography library, Bouncy Castle has reported severe authentication bypass vulnerability. On exploitation the vulnerability (CVE-2020-28052) allows the attacker to g... Read more
Amidst the ongoing pandemic, enterprises are facing the wrath of brute force attacks since weak passwords are diagnosed as its cause. Cybercriminals have taken to such attacks using either a... Read more
A new delivery method has been added to the delivery tactics of Zebrocy malware by its authors. The latest versions of Zebrocy malware have been analyzed by researchers and discovered that t... Read more
With the use of a new attack technique revealed with a proof-of-concept exploit code, Kerberos, a computer-network authentication protocol, can be bypassed. This technique that is termed the... Read more
Cryptocurrency mining was recently been used as a way to hide the purpose of their activity and to avoid triggering high-priority alerts by an advanced threat group called Bismuth. Typically... Read more