Experts Analyze Conti and Hive Ransomware Gangs Chats With Their Victims
An analysis of four months of chat logs spanning more than 40 conversations between the operators of Conti and Hive ransomware and their victims...
An analysis of four months of chat logs spanning more than 40 conversations between the operators of Conti and Hive ransomware and their victims...
A cyberespionage threat actor known for targeting a variety of critical infrastructure sectors in Africa, the Middle East, and the U.S. has been observed...
A previously unknown zero-click exploit in Apple’s iMessage was used to install mercenary spyware from NSO Group and Candiru against at least 65 individuals...
A previously undocumented “sophisticated” information-stealing malware named BlackGuard is being advertised for sale on Russian underground forums for a monthly subscription of $200. “BlackGuard...
It’s been four months since the Log4j issue exploded onto the internet. All the major software vendors affected by it have by now released...
Cybersecurity researchers have shed more light on a malicious loader that runs as a server and executes received modules in memory, laying bare the...
Researchers have blown the lid off a sophisticated malicious scheme primarily targeting Chinese users via copycat apps on Android and iOS that mimic legitimate...
An analysis of two ransomware attacks has identified overlaps in the tactics, techniques, and procedures (TTPs) between BlackCat and BlackMatter, indicating a strong connection...
The absence of any crippling Russian cyberattacks against Ukraine is puzzling experts, but they warn that low-level assaults may be coming, including against the...
Cybersecurity researchers have managed to build a clone of Apple Airtag that circumvents the anti-stalking protection technology built into its Find My Bluetooth-based tracking...