Agent Tesla new enhanced version

Agent Tesla new enhanced version

Six-year-old keylogger malware called Agent Tesla has been updated again, this time with expanded targeting and improved data exfiltration features. Researchers warn that the newest iteration of the malware, is…
VBA Purge Attack

VBA Purge Attack

Cyberattacks relying on malicious Office documents have increasingly leveraged a relatively new technique called VBA Purging, VBA purging involves the use of VBA source code only within Office documents, instead…
Vulnerable TCP/IP Tracking Scripts

Vulnerable TCP/IP Tracking Scripts

A new vulnerabilities in the Treck TCP/IP stack identified by ICS-CERT, Forescout released an open-source tool for detecting whether a network device runs one of the four open-source TCP/IP stacks…
CyberPunk …Installer comes with Ransom

CyberPunk …Installer comes with Ransom

A threat actor is distributing fake Windows and Android installers for the Cyberpunk 2077 game that is installing a ransomware calling itself CoderWare. This tricking users into installing malware, threat…