North Korean state-linked hackers have weaponized a remote access tool called COPPERHEDGE to compromise software systems used ...
In a new campaign, a Russia-backed advanced persistent threat (APT) group is seen abusing Cloudflare tunnels to deliver its proprietary GammaLoad malware. The threat actor, tracked as BlueAlpha, was ...
Cybersecurity researchers at Kaspersky’s Global Research and Analysis Team (GReAT) have spotlighted a highly evolved banking Trojan.
Malware persistence techniques enable attackers to maintain access to compromised endpoints despite system reboots, credential changes, or other disruptions. Common methods include altering ...
There is no doubting that both the complexity of the threat landscape and the cost of defending against it are on an upward curve. More than ever, there is a temptation to rely upon legacy security ...
A threat campaign is targeting high-profile organizations in the government, industrial, and financial sectors across Asia, Africa, and Latin America, with two custom malware implants designed for ...
Analyzing over 14 billion cyber-attack records daily, ThreatBook ATI is a global solution enriched with granular, local insights; and can offer organizations a truly APAC perspective. Boasting low ...
Cyber risk is no longer defined solely by attacker capability. It is increasingly shaped by defensive complexity. Security ...
Developed by Microsoft Research and the Defender teams, Project Ire utilizes advanced reasoning and reverse engineering tools to classify software threats without requiring prior signatures. Microsoft ...
Apple's macOS has been under siege in 2024 as malware-as-a-service platforms and AI-driven threats make the year a turning point for Mac security. For years, macOS had a reputation for being ...