Cyclops on Dual Threat Mode

Cyclops on Dual Threat Mode

Ransomware gang Cyclops that link with LockBit and Babuk ransomware sell new malware that steals data from a network while encrypting it, effectively creating a combination of an info-stealer and…
Byte Code Bites PYPI

Byte Code Bites PYPI

Researchers have discovered a novel attack that used compiled Python byte code  was identified as potentially the first supply chain attack in which bad actors executed PYC files to avoid…
Mirai Bots Targeting IoT Devices

Mirai Bots Targeting IoT Devices

Researchers have found a new malicious activity targeting IoT devices, using a variant of Mirai bots, called IZ1H9 that can be used in large-scale network attacks. It was  discovered in…
Watering hole attack from Tortoiseshell group

Watering hole attack from Tortoiseshell group

Researchers have discovered a watering hole attack that targeted numerous Israeli websites. The attack is believed to be carried out by a nation-state actor from Iran linked with the Tortoiseshell group. Initially spotted…
Operation  Magalenha from Brazil

Operation Magalenha from Brazil

Researchers have identified that more than 2 dozens of Portuguese banks have become victims of targeted hacking by threat actors from Brazil. The campaign is dubbed as operation Magalenha. The…
Mustang Panda targets TP-Link Routers

Mustang Panda targets TP-Link Routers

Researchers have spotted the Chinese state-sponsored APT group Mustang Panda, which has been associated with a series of targeted attacks exploiting TP-Link routers. The campaign has been active since January…