Large-scale phishing campaign targeting Ukraine's taxpayers
The attack deploys the Litemanager RMT, which provides unauthorized access to the infected computer.
The attack deploys the Litemanager RMT, which provides unauthorized access to the infected computer.
Threat actors use Meta’s platform to promote fake advertisements for popular software tools.
In many cases, the interval between initial access and data encryption was about ten hours on average.
The threat actor targeted more than 100 organizations via phishing emails designed to trick users into opening an RDP configuration file.
The breach exposed the personal data of some of Free’s 22.9 million customers.
The sanctioned entities include the Social Design Agency (SDA) and its partner company Structura.
CloudScout enables the theft of data stored on popular cloud services, including Google Drive, Gmail, and Outlook.
The US authorities charged a primary developer and administrator of the RedLine info-stealer.
The threat actor uses the Telegram persona “Civil Defense” to distribute malware and disseminate anti-mobilization narratives.
The intern allegedly exploited a vulnerability on the AI development platform Hugging Face to access the model.
Showing elements 981 - 990