PhishingSecurity Webrat, disguised as exploits, is spreading via GitHub repositories by admin December 23, 2025 by admin December 23, 2025 In early 2025, security researchers uncovered a new malware family named Webrat. Initially, the… 0 FacebookTwitterPinterestEmail
PhishingSecurity New Cloud Atlas APT campaign by admin December 19, 2025 by admin December 19, 2025 Known since 2014, the Cloud Atlas group targets countries in Eastern Europe and Central… 0 FacebookTwitterPinterestEmail
PhishingSecurity Using DCOM objects for remote command execution by admin December 19, 2025 by admin December 19, 2025 Introduction If you’re a penetration tester, you know that lateral movement is becoming increasingly… 0 FacebookTwitterPinterestEmail
PhishingSecurity A new campaign by the ForumTroll APT group by admin December 17, 2025 by admin December 17, 2025 Introduction In March 2025, we discovered Operation ForumTroll, a series of sophisticated cyberattacks exploiting… 0 FacebookTwitterPinterestEmail
PhishingSecurity A vehicle’s head unit hacked via its modem by admin December 16, 2025 by admin December 16, 2025 Introduction Imagine you’re cruising down the highway in your brand-new electric car. All of… 0 FacebookTwitterPinterestEmail
PhishingSecurity Frogblight banking Trojan targets Android users in Turkey by admin December 15, 2025 by admin December 15, 2025 In August 2025, we discovered a campaign targeting individuals in Turkey with a new… 0 FacebookTwitterPinterestEmail
PhishingSecurity Where does the data stolen in a phishing attack go? by admin December 12, 2025 by admin December 12, 2025 Introduction A typical phishing attack involves a user clicking a fraudulent link and entering… 0 FacebookTwitterPinterestEmail
PhishingSecurity Zigbee protocol security assessment | Securelist by admin December 12, 2025 by admin December 12, 2025 We all encounter IoT and home automation in some form or another, from smart… 0 FacebookTwitterPinterestEmail
PhishingSecurity How to detect Mythic activity with NDR-class solutions by admin December 11, 2025 by admin December 11, 2025 Post-exploitation frameworks Threat actors frequently employ post-exploitation frameworks in cyberattacks to maintain control over… 0 FacebookTwitterPinterestEmail
PhishingSecurity Attacks on Kaspersky honeypots exploit CVE-2025-55182 by admin December 11, 2025 by admin December 11, 2025 On December 4, 2025, researchers published details on the critical vulnerability CVE-2025-55182, which received… 0 FacebookTwitterPinterestEmail