A sophisticated cyberattack uses fake PayPal security alerts, starting with phishing emails and escalating through phone-based social engineering to install…
Read More »AnyDesk
Entity category: technology
The DeadLock ransomware campaign uses a BYOVD technique, exploiting a known vulnerability (CVE-2024-51324) in a Baidu Antivirus driver to disable…
Read More »A critical security flaw (CVE-2025-12480) in Gladinet Triofox allows unauthenticated attackers to bypass access controls and gain administrative privileges, which…
Read More »The ransomware attack began when a state employee inadvertently downloaded malware via a poisoned search ad, giving hackers persistent access…
Read More »The Qilin ransomware group uses the Windows Subsystem for Linux (WSL) to deploy Linux encryptors on Windows machines, evading detection…
Read More »Cyber-attacks are increasingly using legitimate remote monitoring and management (RMM) tools like ConnectWise ScreenConnect for initial network access through phishing,…
Read More »Modern ransomware groups exploit minor security oversights, such as human error and misconfigurations, to bypass multi-factor authentication and disable critical…
Read More »Cybersecurity attacks are evolving with threat actors combining social engineering and technical methods, such as using disguised installers and legitimate…
Read More »Abuse of remote access software and services is the most common warning sign of an impending ransomware attack, as cybercriminals…
Read More »A sophisticated phishing campaign distributes the previously undocumented MonsterRAT malware, which targets Windows systems and grants attackers full administrative control…
Read More »A new wave of phishing attacks is exploiting Microsoft Teams, using fake IT support accounts to trick employees into installing…
Read More »Recent arrests in the UK disrupted Scattered Spider, a cybercrime group known for social engineering attacks, leading to a decline…
Read More »Cybersecurity threats have become highly sophisticated, requiring product managers to integrate real-time security measures into development cycles to mitigate risks…
Read More »The ransomware group Chaos employs aggressive double extortion tactics and psychological pressure, offering rewards for compliance while escalating threats like…
Read More »












