Emotet evades Antivirus defenses through OneNote attachments
Emotet once again. But this time the distribution is through OneNote attachments to evade macro security. The new wave of…
Emotet once again. But this time the distribution is through OneNote attachments to evade macro security. The new wave of…
Zero Trust is a concept based on an alternative It security model that, in the absence of a trusted network…
The latest version of Hardbit ransomware encrypts data without first copying it, buying valuable time for the operation. Operators then…
According to PayPal, cyber criminals used stolen credentials from other data breaches to gain access to the accounts of about…
According to Crowdstrike, EDRs (Endpoint Detection and Response) are in the crosshairs of BYOVD (Bring Your Own Vulnerable Driver) attacks.…
Zombinder is a service for sale on the Dark Web that allows cyber attackers to easily add malware to legitimate…
Uber once again appears on the cyber crime scene because of another data leak due to an attack on the…
A new variant of SharkBot, the Android banking trojan that manages to bypass control systems and steal financial information from…
The recently released ISO 27001:2022 updates the controls to be performed to implement, maintain and continuously improve an information security…
The most famous botnet complicit in cyber crime returns. It targets a lot of organizations with Zip attachment containing an…