In the underground markets, stealing corporate credentials is a lucrative industry. Threat actors have been discovered to go to great efforts to get them. Another gang of fraudsters has been spotted imitating Adobe online services and luring the... Read more
Cloud computing aims to ensure rapid, convenient, and cost-effective computation and storage of data. However, data confidentiality problems arise in the cloud context. Cryptography is the key method to enhance the security of cloud computi... Read more
Since its first appearance in 2016, the Mirai botnet has been a continual security IoT concern. The malware and its various variations have recently been attributed to the increase in attacks on IoT (55%) and Linux (38%) in the first quarter of... Read more
An ongoing malware campaign was found that predominantly targets military personnel. The spyware campaign has been operating in Dating and Instant Messaging Apps since January. The current version of PJobRAT malware has been discovered, accordin... Read more
The Babuk gang seems to have slipped back into its old habits of encrypting company networks after announcing its withdrawal from the world of Ransomware in favor of data-theft extraction. The cybercriminals behind Babuk are curre... Read more