By Manucharian Grigoriy Russian hybrid warfare is an intricate field where elements of cyber and physical operations intertwine seamlessly....
Vous n'êtes pas connecté
Executive Summary: In recent cyber attacks, Transparent Tribe, or APT36, has utilized an increasingly sophisticated malware called ElizaRAT. Check Point Research tracked ElizaRAT’s evolution, uncovering its improved execution methods, detection evasion, and Command and Control communication since its public disclosure…
By Manucharian Grigoriy Russian hybrid warfare is an intricate field where elements of cyber and physical operations intertwine seamlessly....
Reflecting on the malware landscape of 2024, it’s clear that cyber threats have continued to evolve and become more sophisticated. Here are some...
Russia appears to be tightening its grip on Ukraine through multiple means, simultaneously escalating military attacks and launching sophisticated...
Russia appears to be tightening its grip on Ukraine through multiple means, simultaneously escalating military attacks and launching sophisticated...
Russia-linked APT29 group uses malicious RDP configuration files, adapting red teaming methods for cyberattacks to compromise systems. In October...
KnowBe4‘s 2025 cybersecurity predictions highlight the rapid evolution of cyber threats in 2024, largely due to the increasing popularity and number...
Researchers discovered PUMAKIT, a Linux rootkit capable of hiding files, escalating privileges, and evading system tools and detection. Elastic...
Researchers discovered PUMAKIT, a Linux rootkit capable of hiding files, escalating privileges, and evading system tools and detection. Elastic...
A sophisticated cyberattack using DarkGate malware was discovered being distributed through a vishing (voice phishing) technique via Microsoft Teams....
< p style=”text-align: justify;”> Ledger users are once again in the crosshairs of phishing attacks as hackers employ increasingly advanced...