CISA sounds alarm over uptick in Emotet attacks against US government entities
Emotet attacks have been significantly increasing since August 2020.
Emotet attacks have been significantly increasing since August 2020.
The spotted an active, “medium volume” email campaign targeting hundreds U.S. and Canadian organizations.
The Bahamut threat group was involved in sophisticated attacks against government officials and private companies in the Middle East and South Asia.
The attack may be the work of the Vietnamese APT32 group.
The attackers behind the PoetRAT malware continue to improve their OpSec.
Dubbed HEH, the botnet is written in Go language, and uses proprietary P2P protocol.
The four vulnerable npm packages include electorn, loadyaml, lodashs, and loadyml.
The malicious UEFI firmware is based on the leaked source code of the VectorEDK bootkit developed by now-defunct Italian vendor HackingTeam.
The attacks attributed to the Muddy Water APT group have been occurring for the last two weeks.
The cybercriminals have targeted the merchants’ point-of-sale (POS) terminals in an effort to harvest and exfiltrate payment card data.
Showing elements 3461 - 3470