Recently, a new power-based side-channel attack named Platypus was discovered by researchers at the Institute of Applied Information Processing and Communications at the Graz University of Technology. The name of this cyber-attack is an acronym... Read more
New scanners and exploits are being added by IoT botnet operators to their ever-expanding arsenal in order to harvest new IoT devices. A popular botnet named Mushtik has been leveraging several web application exploits and targeting cloud infras... Read more
A legitimate penetration testing toolkit used by red teams called Cobalt Strike had its source code allegedly leaked online in a GitHub repository. This tool enjoys rich popularity in the world of cybercrime as well. The cobalt strike toolkit al... Read more
Researchers are left baffled with the task of unmasking a new and advanced APT (Advanced Persistent Threat) group that is targeting non-governmental organizations in the Southeast Asian nation Myanmar (formerly Burma). Researchers have diagnosed... Read more
To avoid getting flagged as malicious by crawlers designed to spot phishing sites, a unique Office 365 phishing campaign has been inverting images used as backgrounds for landing pages. Such inverted backgrounds are commonly used in phishing cam... Read more