At least 17 US utility companies hit by state-sponsored LookBack phishing attack
An ongoing phishing campaign against US utility firms has evolved its tactics and extended its target list to include more than dozen companies.
An ongoing phishing campaign against US utility firms has evolved its tactics and extended its target list to include more than dozen companies.
Two large hotel chains have had their payment webpages compromised by card skimming scripts.
The botnet compromises machines using various methods, the prominent ones being the EternalBlue exploit and brute-force of different services and protocols.
To compromise their targets the group used a unique malware called Backdoor.Syskit.
While not highly sophisticated, the Panda group is considered one of the most active attackers on today’s cybercriminal scene.
The new Emotet campaign targeеы Germany, the United Kingdom, Poland, Italy, and the USA.
The malware uses legitimate services to cover its malicious activity.
"SimJacker" attack lets hackers take over any phone just by sending an SMS message.
FPX files have a significantly lower detection rate than standard VBA files.
In its recent attacks the Thrip group has used a new backdoor called Hannotog as well as another tool known as Sagerunex, which appears to be connected to espionage group Billbug.
Showing elements 3901 - 3910