New Ghostwriter campaign targets Ukrainian military and government orgs
Between 2020 and 2024, Ghostwriter used malicious Excel documents to deliver PicassoLoader and Cobalt Strike payloads.
Between 2020 and 2024, Ghostwriter used malicious Excel documents to deliver PicassoLoader and Cobalt Strike payloads.
The botnet exploits a vulnerability, which affects several models of Cisco Small Business Routers.
The malware used in these attacks included sophisticated tools such as Secondbest, Empirepast, Spark, and Crookbag.
Apple’s iMessage and FaceTime services, along with data from Health and iCloud Keychain, will continue to be end-to-end encrypted in the UK.
The ban follows a risk assessment, which concluded that Kaspersky products posed an unacceptable security risk to Australian government networks and data.
North Korean Kimsuky and BlueNoroff groups used ChatGPT to gather intelligence related to cyber intrusion tools and cryptocurrency topics.
The breach occurred when the company was in the process of transferring funds from a "cold wallet" to a "hot wallet" for operational purposes.
In brief: BlackBasta's chat logs leak online, Russian hackers increasingly target Signal for espionage, and more
The attacks exploit vulnerabilities in outdated software and firmware used by organizations with internet-facing services.
The campaign exploited a recently-patched vulnerability in Check Point network gateway security products.
Showing elements 771 - 780