Water Saci has upgraded its self-propagating malware to compromise banks and crypto exchanges by targeting enterprise users ...
Written in C++, NANOREMOTE is equipped to perform reconnaissance, execute files and commands, and transfer files to and from ...
A new Android malware called DroidLock has emerged with capabilities to lock screens for ransom payments, erase data, access text messages, call logs, contacts, and audio data.
More than 10,000 Docker Hub container images expose data that should be protected, including live credentials to production ...
Huntress reports active attacks abusing Gladinet’s fixed cryptographic keys to forge tickets and gain remote code execution ...
Researchers demonstrated that it is feasible to encode executable payloads into synthetic DNA that, once sequenced and ...
We are either at the dawn of AI-driven malware that rewrites itself on the fly, or we are seeing vendors and threat actors exaggerate its capabilities. Recent Google and MIT Sloan reports reignited ...
Attackers are moving beyond on-prem systems and now using AWS’s own encryption and key management features to lock organizations out of their cloud data. Ransomware operators are shifting their focus ...
A data breach at a mortgage software firm has left some of Wall Street’s biggest banks scrambling to secure customer data. SitusAMC, a platform used by hundreds of banks to originate and service real ...
GitGuardian's Non-Human Identity Guide uncovers the rising risks posed by machine identities - like service accounts and CI/CD tools - that now outnumber human users in modern software development.