In order to hide its backup C2 IP addresses, a recent crypto mining botnet campaign has been observed using Bitcoin blockchain transactions. It’s turned out to be a very effective way of staying undetected and avoiding any takedown attempts. The... Read more
Due to a zero-day flaw in legacy software provided by Accellion, the Reserve Bank of New Zealand became the victim of a data breach. The breached exposed files including – personal email addresses, dates of birth, and credit information. O... Read more
Novel attack techniques are being used by cybercriminals in which they are using Google SEO to deploy malware payloads. While taking advantage of human psychology, SEO tricks are also used to improve the compromised websites’ ranking in Google s... Read more
California-based Cloud Security and Compliance firm Qualys Inc. has ironically fallen prey to a data breach at the hands of Clop ransomware gang. The threat actors posted screenshots of the files allegedly belonging to Qualys and its custo... Read more
While investigating an early attack in 2021, the French national cyber-security agency discovered a new variant of the Ryuk ransomware. This variant has worm-like capabilities that allow it to spread to other devices on victims’ local netw... Read more