Amidst the ongoing pandemic, enterprises are facing the wrath of brute force attacks since weak passwords are diagnosed as its cause. Cybercriminals have taken to such attacks using either a variety of botnets or Remote Desktop Protocol., with a... Read more
A new delivery method has been added to the delivery tactics of Zebrocy malware by its authors. The latest versions of Zebrocy malware have been analyzed by researchers and discovered that the malware operators, APT28, have chosen the Golang lan... Read more
With the use of a new attack technique revealed with a proof-of-concept exploit code, Kerberos, a computer-network authentication protocol, can be bypassed. This technique that is termed the Bronze Bit attack, exploits the CVE-2020-17049 vulnera... Read more
Cryptocurrency mining was recently been used as a way to hide the purpose of their activity and to avoid triggering high-priority alerts by an advanced threat group called Bismuth. Typically regarded as a non-critical security issue, the method... Read more
Researchers have recently unveiled that the Black Caracal threat group is very much alive and active. Dark Caracal, which was first discovered by researchers in January, is the first known global campaign that steals data from Android devic... Read more