A new delivery method has been added to the delivery tactics of Zebrocy malware by its authors. The latest versions of Zebrocy malware have been analyzed by researchers and discovered that the malware operators, APT28, have chosen the Golang lan... Read more
With the use of a new attack technique revealed with a proof-of-concept exploit code, Kerberos, a computer-network authentication protocol, can be bypassed. This technique that is termed the Bronze Bit attack, exploits the CVE-2020-17049 vulnera... Read more
Cryptocurrency mining was recently been used as a way to hide the purpose of their activity and to avoid triggering high-priority alerts by an advanced threat group called Bismuth. Typically regarded as a non-critical security issue, the method... Read more
Researchers have recently unveiled that the Black Caracal threat group is very much alive and active. Dark Caracal, which was first discovered by researchers in January, is the first known global campaign that steals data from Android devic... Read more
Recently the OceanLotus group which has been active since 2013 and has launched attacks against media, research, and construction companies is now targeting Apple macOS users in a hacking operation. A backdoor was used by the threat group ... Read more