Almost every industry has been impacted by threat actors, making defenders operate in a preventive in a security posture. Security Intelligence is the Excalibur of security tools with cybersecurity intelligence showing commitment to preventive s... Read more
A new stealthy backdoor from the authors of TrickBot that is used to compromise and gain full access to corporate networks is being delivered through a new phishing campaign. Gaining access in a quiet manner over a corporate network is a m... Read more
A recent study that dealt with the trends within the threat landscape revealed that fileless threats are the most common critical-severity cybersecurity threat to endpoints in the threat category list. The research report further reveals that en... Read more
The evolution of the threat landscape is proving difficult to handle for those who are ill prepared for this rapid transformation in technology. And now with malicious entities from the digital world offering their hacker-for-hire services to th... Read more
A new strain of Android malware that comes with a wide array of features has recently been analysed and discovered by security researchers. This malware strain is capable of stealing credentials from 226 applications.This new trojan called Alien... Read more