To share their illicit plunder obtained from ransomware attacks targeting high profile public and private organizations Ransomware-as-a-service (RaaS) crews are actively looking for affiliates. The stark reality of this plunder and earn lifecycl... Read more
Recently, a new power-based side-channel attack named Platypus was discovered by researchers at the Institute of Applied Information Processing and Communications at the Graz University of Technology. The name of this cyber-attack is an acronym... Read more
New scanners and exploits are being added by IoT botnet operators to their ever-expanding arsenal in order to harvest new IoT devices. A popular botnet named Mushtik has been leveraging several web application exploits and targeting cloud infras... Read more
A legitimate penetration testing toolkit used by red teams called Cobalt Strike had its source code allegedly leaked online in a GitHub repository. This tool enjoys rich popularity in the world of cybercrime as well. The cobalt strike toolkit al... Read more
Researchers are left baffled with the task of unmasking a new and advanced APT (Advanced Persistent Threat) group that is targeting non-governmental organizations in the Southeast Asian nation Myanmar (formerly Burma). Researchers have diagnosed... Read more