Sysrv cryptomining botnet is still alive (and kicking out the competition) Sysrv cryptomining botnets are still active, and analysis shows they are actively kicking out other malware. 4 minutes
Why ransomware gangs want you to keep using that GPON router A vulnerability found in 2018 is ranked #6 on the list of most attacked vulnerabilities. 2 minutes
Ransomware gangs target SonicWall vulnerability SonicWall is urging customers affected by CVE-2024-40766 to "please apply the patch as soon as possible." 2 minutes
At last! Microsoft calls time on ActiveX in Office 2024 When Office 2024 is released next month, ActiveX controls will be off by default in client apps like Word, Excel,… 2 minutes
You have one minute to save your leaked AWS credentials New research suggests that cyber-thieves can discover and use leaked credentials in a matter of seconds. 3 minutes
Rise of Atomic Stealer signals a sea change in macOS malware Atomic Stealer is the most popular malware-as-a-service on macOS because of highly active affiliate-driven distribution campaigns and constant feature upgrades. 4 minutes
Rhysida using Oyster Backdoor to deliver ransomware In a recent attack, Rhysida used a new variant of the Oyster backdoor, also known as Broomstick. 3 minutes
Fake CrowdStrike hot fix leads to Remcos Trojan To nobody's surprise, cybercriminals are abusing the CrowdStrike outage. 2 minutes
Why Microsoft? Why? A vulnerability in IE (yes! IE!) has been used for over a year as a zero-day to plant infostealers on… 3 minutes
Watch out for CRYSTALRAY, an open source aficionado with a hunger for crypto The CRYSTALRAY group, tracked by Sysdig, is using a suite of open source tools to find and compromise targets for… 1 minute