Aug 08, 2023THNMalware / Cyber Threat The operators associated with the QakBot (aka QBot) malware have set up 15 new command-and-control (C2) ...
Category: Attack
Aug 08, 2023THNCyber Threat / Network Security New research has revealed that threat actors are abusing Cloudflare Tunnels to establish covert...
Aug 08, 2023THNEndpoint Security / Malware An unknown threat actor is using a variant of the Yashma ransomware to target various entities in E...
Introduced in 1999, Microsoft Active Directory is the default identity and access management service in Windows networks, responsible for assign...
Aug 08, 2023THNMalware / Cyber Threat Cybersecurity researchers have discovered a set of 11 living-off-the-land binaries-and-scripts (LOLBAS) ...
Aug 07, 2023THNCyber Crime / Malware A new malware campaign has been observed making use of malicious OpenBullet configuration files to target...
Aug 07, 2023THNCyber Attack Two different North Korean nation-state actors have been linked to a cyber intrusion against the major Russian mis...
Aug 07, 2023THNData Security / Linux Vulnerable Redis services have been targeted by a "new, improved, dangerous" variant of a malware called ...
Aug 07, 2023THNDeep Learning / Endpoint Security A group of academics has devised a "deep learning-based acoustic side-channel attack" that ca...
Aug 07, 2023The Hacker NewsSIEM and XDR Platform In today's interconnected world, evolving security solutions to meet growing demand is more c...