-
Posted On Uncategorized
Open-Source Xeno RAT Trojan Emerges as a Potent Threat on GitHub
An “intricately designed” remote access trojan (RAT) called Xeno RAT has been made available on GitHub, making it available to other actors…
-
Posted On Uncategorized
NIST releases expanded 2.0 version of the Cybersecurity Framework
After two years of work, the US National Institute of Standards and Technology (NIST) has issued the 2.0 version of…
-
Posted On Uncategorized
ConnectWise Phishing Scam Targets Healthcare and Crypto Sectors in US
A new ConnectWise phishing campaign has been discovered directed at both the healthcare and cryptocurrency communities in the United States.…
-
Posted On Uncategorized
Akira Ransomware Group Threatens to Leak Stolen Data from Swedish Municipality
The Akira ransomware group has set its sights on yet another target: the municipality of Bjuv in Skåne County, South…
-
Posted On Uncategorized
New Hugging Face Vulnerability Exposes AI Models to Supply Chain Attacks
Cybersecurity researchers have found that it’s possible to compromise the Hugging Face Safetensors conversion service to ultimately hijack the models…
-
Posted On Uncategorized
Five Eyes Agencies Expose APT29’s Evolving Cloud Attack Tactics
Cybersecurity and intelligence agencies from the Five Eyes nations have released a joint advisory detailing the evolving tactics of the…
-
Posted On Uncategorized
From Alert to Action: How to Speed Up Your SOC Investigations
Processing alerts quickly and efficiently is the cornerstone of a Security Operations Center (SOC) professional’s role. Threat intelligence platforms can…
-
Posted On Uncategorized
Mogilevich Ransomware Group Claims Cyberattack on Bazaarvoice, Data on Sale
The Mogilevich ransomware group has claimed responsibility for a cyberattack on Bazaarvoice, a leading platform connecting brands and retailers with…