Chinese Hackers Develop a New Hacking Framework Similar to Cobalt Strike – Manjusaka
A new report released by Cisco Talos states that a fully functional version of the command and control is written…
Read MoreA new report released by Cisco Talos states that a fully functional version of the command and control is written…
Read MoreThe Motorola event was supposed to officially launch two new phones. These were the Motorola Razr 2022 foldable phone and…
Read MoreConsumer Key and Consumer Secret, both legitimate sources of information, report that according to CloudSEK, a Singapore-based cybersecurity firm, 3,207…
Read MoreA recent report from Android Police reports that Google will be rolling out an update just days after the launch…
Read MoreIt was reported by a cybersecurity firm called Volexity that the malware was attributed to SharpTongue, an activity cluster. This…
Read MoreMicrosoft details that a company described being a private-sector offensive actor, or PSOA, is a company disguised as an Austrian-based…
Read MoreThe new campaign called Ducktail is designed to attack Facebook businesses and advertising accounts and seize control. This campaign is…
Read MoreAccording to a new warning issued by the Microsoft 365 Defender Research Team, IIS backdoors are much more difficult to…
Read MoreA few years ago, the Racoon Stealer malware disguised itself as a service platform. This platform started to gain notoriety…
Read MoreMonths after expanding to target other European countries, the mobile threat campaign tracked as Roaming Mantis is attacking French mobile…
Read MoreAccording to the Android developers, they needed to withhold privacy and transparency as it is one of the core values…
Read MoreIt was found by a Czech cybersecurity firm Avast that the Candiru, or Saito Tech, was directly linked to the…
Read More