A vast attack surface is available at the cybercriminals disposal and the frequent attacks on cloud and container environments are evident of the very fact. Researchers recently have found a first-ever crypto-mining worm dubbed ‘TeamTNT’ contain... Read more
According to researchers, a South Korean organization suffered a very strong cyber attack. The details of this attack campaign were shared as below. What Happened? This attack campaign involved exploitation zero-day vulnerabilities in Windows an... Read more
After remaining unnoticed for over three years, the Konni remote access trojan (RAT) has now sprung back in action. as per the US Cybersecurity and Infrastructure Security Agency (CISA), this RAT has been active since 2014 but it has been grabbi... Read more
After a brief hiatus from spreading its malice, the notorious Emotet spamming trojan has come alive again and it’s spewing out a massive campaign of malicious emails targeting users worldwide. Emotet is the kind of malware that spreads its... Read more
For continuously evaluating the resilience of end-users to phishing and similar social engineering attacks, researchers from the Ben-Gurion University (BGU) of Israel have developed a framework. This new approach is based on actual data gathered... Read more