Rat Attack: Phishing attack that deploys two trojans
A threat actor has been found to leverage two of the most popular remote access trojans including RevengeRAT and…
A threat actor has been found to leverage two of the most popular remote access trojans including RevengeRAT and…
European Central Bank has recently become the victim of a cyber attack. The attack was successfully deployed by injecting a…
Since the last decade, cyber attackers have especially affected businesses that depend on computerized technology for conducting their daily business.…
Vulnerabilities are the anomalies, such as programming errors or configuration issues, of the IT infrastructure. Attackers exploit the weaknesses in…
Privileges refer to the permissions granted to a user or group of systems, allowing them to perform specific tasks. A…
Last two years have been loaded with incidents of data breach on the healthcare sector. However, AMCA data breach is one…
Bulgaria, an East European country, has suffered from the biggest data breach in its history that has resulted in the compromise…
A decade ago, the ‘spray and pray’ method was extremely popular for sending out phishing emails. This involved sending a…