With the takedown of the powerful Emotet Trojan, the cybersecurity domain has started the year on a great note. The operation that ran for two whole years finally tasted success with a coordinated effort from law enforcement agencies and securit... Read more
At a recent cyber threat intelligence summit details about the Sprite Spider were disclosed by two researchers. The threat actor who commenced their journey of malice in 2015 with a banking Trojan has since reached great heights of sophisticatio... Read more
In recent times, Ransomware-as-a-Service (RaaS) has become an alluring and well-paid enterprise. According to researchers, blockchain transactions prove that ransomware attacks are interconnected. A report generated by researchers, connect the... Read more
In order to hide malicious URLs in an email attachment, the novel obfuscation technique of using Morse code is being put to use by a new targeted phishing campaign. The Morse code, invented by Samuel Morse and Alfred Vail is a way of transm... Read more
Known for targeting cloud infrastructures with cryptojacking attacks, the Rocke Group has come back to life. Pro-Ocean, its cloud-targeted cryptojacking malware has recently upgraded with rootkit detection-evasion features and worm capabilities.... Read more