A legitimate penetration testing toolkit used by red teams called Cobalt Strike had its source code allegedly leaked online in a GitHub repository. This tool enjoys rich popularity in the world of cybercrime as well. The cobalt strike toolkit al... Read more
Researchers are left baffled with the task of unmasking a new and advanced APT (Advanced Persistent Threat) group that is targeting non-governmental organizations in the Southeast Asian nation Myanmar (formerly Burma). Researchers have diagnosed... Read more
To avoid getting flagged as malicious by crawlers designed to spot phishing sites, a unique Office 365 phishing campaign has been inverting images used as backgrounds for landing pages. Such inverted backgrounds are commonly used in phishing cam... Read more
The mode of delivery is always varied and updated by cybercriminals to lure their victims. Recently, a new method of phishing was discovered to lure innocent victims. Google drive scams were seen being executed by hackers with an added layer of... Read more
According to research by a team at Concordia University in Montreal, two-thirds of the vulnerabilities found in container images can be eliminated by regularly updating software components, while minimizing the number of libraries can also reduc... Read more