A novel malware that uses a variety of tricks to stay under the radar and evade detection, while stealthily capable of executing arbitrary commands on infected system called 'Pingback,' the…
Security researchers of Microsoft from “Section 52,” it’s an Azure Defender for IoT research group have detected nearly 25 CVE vulnerabilities that are continuously affecting a wide range of Internet-connected…
The Mitre Corporation has released the ninth version of its ATT&CK knowledge base of adversary TTP which now also includes a newly created ATT&CK matrix for containers includes 16 new…
The analysis was initially carried out for the Pwn2Own 2020 hacking competition the contest offered a car and other significant prizes for hacking a Tesla but the findings were later…
Buer is a modular malware-as-a-service offering that's sold on underground forums and used as a first-stage downloader to deliver additional payloads, providing initial compromise of targets' Windows systems and allowing…
The eSentire Threat Response Unit (TRU) has identified that attackers are using new techniques to lure business professionals to hacker-controlled websites hosted on Google Sites. Moreover, the cybersecurity solutions provider…
Zero-day vulnerabilities are among the deadliest threats leveraged by attackers to accomplish their malicious attacks. Damage done by recent ProxyLogon zero-day attacks. Several cybercriminals are continuously striving to discover new…
China-linked APT group targets a Russian defense contractor involved in designing nuclear submarines for the Russian Navy. The state-sponsored hackers sent spear-phishing messages to a general director working at the…