A legitimate penetration testing toolkit used by red teams called Cobalt Strike had its source code allegedly leaked online in a GitHub repository. This tool enjoys rich popularity in the wo... Read more
Researchers are left baffled with the task of unmasking a new and advanced APT (Advanced Persistent Threat) group that is targeting non-governmental organizations in the Southeast Asian nati... Read more
To avoid getting flagged as malicious by crawlers designed to spot phishing sites, a unique Office 365 phishing campaign has been inverting images used as backgrounds for landing pages. Such... Read more
The mode of delivery is always varied and updated by cybercriminals to lure their victims. Recently, a new method of phishing was discovered to lure innocent victims. Google drive scams were... Read more
According to research by a team at Concordia University in Montreal, two-thirds of the vulnerabilities found in container images can be eliminated by regularly updating software components,... Read more
Following the efforts of the defenders of our sacred cyberspace that have been targeting the Trickbot’s command and control servers, the malware’s operations are on the brink of completely s... Read more