Seqrite Labs said it observed some level of tactical overlaps between the threat actor and YoroTrooper (aka SturgeonPhisher), ...
Hackers deliver AsyncRAT using Dropbox URLs and TryCloudflare tunnels, exploiting legitimate services to bypass security ...
"A vulnerability within the Veeam Updater component that allows an attacker to utilize a Man-in-the-Middle attack to execute arbitrary code on the affected appliance server with root-level permissions ...
CISA adds four exploited vulnerabilities to its KEV catalog, urging fixes by Feb 25, 2025, to counter active threats ...
Contagious Interview, first uncovered in late 2023, is a persistent effort undertaken by the hacking crew to deliver malware ...
Microsoft 365 tenants faced ATO attempts by late 2024, with attackers using HTTP clients like Axios and Node Fetch.
Crazy Evil, active since 2021, has stolen over $5M via crypto scams, malware like AMOS, and phishing, targeting both Windows ...
24% of companies ran 4+ vulnerability scans in 2024, up from 15% in 2023, showing a shift to continuous monitoring.