Who’s registering what? Exploring trends in gTLDs and ccTLDs with WhoisXML API
A recent white paper released by WhoisXML API sheds light on the evolving landscape of domain name registrations, revealing intriguing…
Threat actors exploit brand collaborations to target popular YouTube channels
In recent years, collaborations between brands and influencers on platforms like YouTube have surged, creating lucrative opportunities for content creators.…
An app that contains a banker malware
A recent article on Securelist highlights a new malware threat known as “Mamont,” which is disguised as a parcel tracking…
Yokai Backdoor campaign using DLL side-loading techniques
Thai government officials are currently facing a sophisticated cyber threat as they become the primary targets of a new malware…
Curl vulnerability exposes user credentials in redirects
A recently discovered vulnerability in cURL, identified as CVE-2024-11053, poses a significant risk by potentially exposing user credentials during HTTP…
FLUX#CONSOLE: new malware campaign exploits Windows Management Console
In a sophisticated attack dubbed FLUX#CONSOLE, threat actors are employing tax-themed phishing lures to exploit the Microsoft Management Console (MMC),…
Cryptojacking: protecting Docker and Kubernetes environments from new attacks
Cryptojacking—the unauthorized use of systems to mine cryptocurrency—has seen a troubling surge, with attackers increasingly exploiting misconfigured Docker and Kubernetes…
DragonRansomware emerges: a new threat on Telegram
A new ransomware variant called DragonRansomware has made its debut, promising customizable and efficient ransomware operations aimed at Windows systems.…
Emerging ransomware threat targets macOS users
Apple users, beware! A new ransomware variant, macOS.NotLockBit, is shifting the cybersecurity landscape, traditionally dominated by Windows and Linux threats,…