Persistent backdoors via Linux pluggable authentication modules: a new threat
Recent research by the Group-IB Digital Forensics and Incident Response (DFIR) team has revealed a novel technique exploiting Linux’s Pluggable…
Navigating the cyber sea with knowledge
Recent research by the Group-IB Digital Forensics and Incident Response (DFIR) team has revealed a novel technique exploiting Linux’s Pluggable…
In recent weeks, the cybersecurity landscape has witnessed a concerning uptick in malicious activities targeting developers through compromised NPM (Node…
As the 2024 US presidential election looms, the Microsoft Threat Analysis Center (MTAC) has unveiled an alarming uptick in cyber-enabled…
In late 2023, the ransomware group Hunters International emerged on the cyber threat landscape, drawing attention due to their sophisticated…
In recent months, Cisco Talos has heightened its monitoring efforts concerning malicious campaigns centered around the NetSupport Remote Access Trojan…
A new Android banking trojan, identified as “BlankBot,” has emerged as a critical threat for mobile users, particularly targeting those…
In mid-2023, a security report from Volexity unveiled a significant cyber espionage campaign orchestrated by the Chinese hacking group known…
Microsoft has recently enhanced its Microsoft 365 Personal and Family subscriptions by introducing the Microsoft Defender VPN service, now available…