Discover how crypto malware operates through cryptojacking and ransomware, with real-world examples such as WannaMine and PowerGhost ...
A Chinese-linked cyberespionage group targeted U.S. government and policy-related officials with Venezuela-themed phishing ...
Researchers detailed how Intellexa, Predator's owner, uses failed deployments to strengthen its commercial spyware and ...
It uncovered the campaign after spotting a zip file “US now deciding what’s next for Venezuela” that was uploaded on January ...
In 2026, leading SOCs reduce MTTR and MTTD by using automated, behavior-based analysis instead of manual reviews and static scans.
The US Department of Justice said in a January 2025 statement that Mustang Panda was a “group of hackers sponsored by the ...
The Gootloader malware, typically used for initial access, is now using a malformed ZIP archive designed to evade detection ...
Cybersecurity firm Group-IB found the DeadLock ransomware is exploiting Polygon smart contracts to create a resilient ...
The ransomware family’s abuse of Polygon smart contracts echoes techniques recently seen in Ethereum-based attacks.