In the new campaign, Gootloader was most likely leveraged by a group known as Storm-0494, as well as its downstream operator, ...
A threat actor exploited a critical vulnerability in Triofox to obtain remote access to a vulnerable server and then achieve code execution.
Iran’s APT42 launches SpearSpecter campaign using TAMECAT malware, targeting defense and government officials.
This investigation, conducted with support from the Georgian CERT, uncovered new tools and techniques used by the Curly COMrades threat actor. It established covert, long-term access to victim ...
The Russian hacker group Curly COMrades is abusing Microsoft Hyper-V in Windows to bypass endpoint detection and response ...
Recently documented Curly COMrades group bypasses traditional host-based EDR solutions by spinning up VMs with deceptive ...
"The proliferation of cybercrime services supporting each step of the Booking.com attack chain reflects a professionalization ...
Akira ransomware has extorted $244M since September 2025, with some attacks exfiltrating data in just two hours, a joint cybersecurity advisory warns ...
A sudden CPU spike turned out to be the first clue of an in-progress RansomHub ransomware attack. Varonis breaks down how ...
Over the last month, Barracuda threat analysts have seen the following notable developments in email-based threats targeting ...
Threat actors were exploiting vulnerable versions of Triofox after a patched version was released, said Google Cloud ...