Cybersecurity Threats | Malware Types | Social Engineering AttacksĀ Lazarus Group boosts malware tools with PondRAT, ThemeForestRAT, & RemotePE
Cybercrime | Malware Distribution | Social Engineering ShadowCaptcha distributing ransomware & cryptominers via compromised WordPress sites
Cybersecurity Threats | Malware TechniquesĀ | Targeted AttacksĀ Transparent Tribe spear-phishing Indian government using weaponised desktop shortcuts
Cybersecurity Threats | Malware Distribution MethodsĀ | Phishing TechniquesĀ Cybercriminals are exploiting SVG files by embedding harmful JavaScript to deploy malware on Windows systems.
Credential HarvestingĀ | Remote Access ToolsĀ | Social Engineering Cybercriminals Employ Social Engineering Tactics to Secure Remote Access in 300 Seconds.
Cybersecurity Cyber attackers are exploiting counterfeit OAuth applications in conjunction with the Tycoon Kit to compromise Microsoft 365 accounts.