New scanners and exploits are being added by IoT botnet operators to their ever-expanding arsenal in order to harvest new IoT devices. A popular botnet named Mushtik has been leveraging several web application exploits and targeting cloud infras... Read more
A legitimate penetration testing toolkit used by red teams called Cobalt Strike had its source code allegedly leaked online in a GitHub repository. This tool enjoys rich popularity in the world of cybercrime as well. The cobalt strike toolkit al... Read more
Researchers are left baffled with the task of unmasking a new and advanced APT (Advanced Persistent Threat) group that is targeting non-governmental organizations in the Southeast Asian nation Myanmar (formerly Burma). Researchers have diagnosed... Read more
To avoid getting flagged as malicious by crawlers designed to spot phishing sites, a unique Office 365 phishing campaign has been inverting images used as backgrounds for landing pages. Such inverted backgrounds are commonly used in phishing cam... Read more
The mode of delivery is always varied and updated by cybercriminals to lure their victims. Recently, a new method of phishing was discovered to lure innocent victims. Google drive scams were seen being executed by hackers with an added layer of... Read more