Trigona ransomware spotted in increasing attacks worldwide
Trigona has been active for some time, with samples seen at the beginning of the year
Read More...Trigona has been active for some time, with samples seen at the beginning of the year
Read More...The simplicity and profitability of these attacks continue to appeal to threat actors a decade later
Read More...Threat actors who accessed the bucket may use this information in different forms for extortion, blackmailing, creating social engineering tactics with the help of exposed information, or simply selling the information to the highest bidder on the dark web and Telegram channels
Read More...The evolution of email-based phishing threats into a service-based economy means that adversaries who aim to conduct phishing attacks can now simply purchase such resources and infrastructure without having to work on it themselves
Read More...The majority of these recent campaigns are pushing a ClickOnce executable named 'support.Client.exe,' that, when launched, installs the ScreenConnect remote access tool
Read More...An analysis of the ransomware sample has uncovered multiple similarities between the EDR bypass implementation and that of a C-based open-source tool called EDRSandblast, designed to abuse vulnerable signed drivers to evade detection.
Read More...Unlike most active ransomware operations, Royal does not operate as a Ransomware-as-a-Service but is instead a private group without affiliates.
Read More...The Cybersecurity and Infrastructure Security Agency (CISA) has added three more security flaws to its list of bugs exploited in attacks, including a Bitbucket Server RCE and two Microsoft Exchange zero-days.
Read More...With the help of malicious vSphere Installation Bundles, the attacker could install on the bare-metal hypervisor two backdoors
Read More...The lure in these phishing emails is a request for bids for lucrative government projects, taking them to phishing pages that are clones of legitimate federal agency portals
Read More...