As a negotiation tactic to force victims into paying, Avaddon ransomware operators are now using DDoS attacks. This kind of attack is now termed as Ransom DDoS or RDDoS attack, which has already been put to use by a few ransomware operators, inc... Read more
In an operation coordinated by Europol and Eurojust, one of the most active and dangerous botnets, Emotet has been taken down by international authorities. The email spamming botnet that was used to spread malice through word attachments wa... Read more
TrickBot malware has re-emerged with its new variants being launched regularly after its takedown attempt last November. Yet again, they have launched a more persistent version of the malware. Yesterday vs Today A short-term relief was given to... Read more
Verified accounts are being hacked by threat actors in an Elon Musk cryptocurrency giveaway scam that has recently become widely active. However, there is nothing new or alarming about this scam or for that matter any Twitter scam pretending to... Read more
Employed by several attackers, Zero-day vulnerabilities are one of the most preferred attacking techniques of several attackers these days. Zero-day vulnerabilities are actively being abused by threat actors to accomplish their goals ranging fro... Read more