LockBit ransomware group sets the stage for a dramatic comeback with version 4.0
The notorious LockBit ransomware group is gearing up for a major return with the anticipated release of LockBit 4.0, scheduled…
Phishing attack targets European firms
A recent investigation by Unit 42 has unveiled a significant phishing campaign targeting European companies, particularly in the automotive and…
C.A.S operations: RATs and Russian malware exploits
The Cyber Anarchy Squad (C.A.S), a prominent hacktivist group, has intensified its operations against organizations in Russia and Belarus since…
Who’s registering what? Exploring trends in gTLDs and ccTLDs with WhoisXML API
A recent white paper released by WhoisXML API sheds light on the evolving landscape of domain name registrations, revealing intriguing…
Threat actors exploit brand collaborations to target popular YouTube channels
In recent years, collaborations between brands and influencers on platforms like YouTube have surged, creating lucrative opportunities for content creators.…
An app that contains a banker malware
A recent article on Securelist highlights a new malware threat known as “Mamont,” which is disguised as a parcel tracking…
Yokai Backdoor campaign using DLL side-loading techniques
Thai government officials are currently facing a sophisticated cyber threat as they become the primary targets of a new malware…
Curl vulnerability exposes user credentials in redirects
A recently discovered vulnerability in cURL, identified as CVE-2024-11053, poses a significant risk by potentially exposing user credentials during HTTP…