In this article, we will provide a brief overview of Silverfort's platform, the first (and currently only) unified identity protection platform ...
Category: Attack
î ‚Nov 20, 2023î „NewsroomMalware / Cyber Attack The stealer malware known as LummaC2 (aka Lumma Stealer) now features a new anti-sandbox technique ...
Today's security leaders must manage a constantly evolving attack surface and a dynamic threat environment due to interconnected devices, cloud ...
î ‚Nov 20, 2023î „NewsroomCryptocurrency / Blockchain Bitcoin wallets created between 2011 and 2015 are susceptible to a new kind of exploit called ...
An Indian hack-for-hire group targeted the U.S., China, Myanmar, Pakistan, Kuwait, and other countries as part of a wide-ranging espionage, surv...
The threat actors behind the 8Base ransomware are leveraging a variant of the Phobos ransomware to conduct their financially motivated attacks. ...
î ‚Nov 18, 2023î „NewsroomCyber Attack / USB Worm Russian cyber espionage actors affiliated with the Federal Security Service (FSB) have been observ...
î ‚Nov 17, 2023î „NewsroomMalvertising / Malware Threat actors are leveraging manipulated search results and bogus Google ads that trick users who a...
î ‚Nov 17, 2023î „NewsroomFraud Prevention / Mobile Security The U.S. Federal Communications Commission (FCC) is adopting new rules that aim to prot...
An unknown threat actor has been observed publishing typosquat packages to the Python Package Index (PyPI) repository for nearly six months with...
