The state-sponsored hackers deployed custom tools and stayed dormant in the compromised environments for months.
"Living Off the Land" attacks use built-in tools and processes instead of traditional malware.
The LeakNet ransomware gang is now using the ClickFix technique for initial access into corporate environments and deploys a ...
Ransomware criminals exploited CVE-2026-20131, a maximum-severity bug in Cisco Secure Firewall Management Center software, as a zero-day vulnerability more than a month before Cisco patched the hole, ...
A prolific ransomware group has been exploiting a zero-day vulnerability in a Cisco firewall product since January, according ...
The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation ...
ESET researchers document how the Sednit APT group has reemerged with a modern toolkit centered on two paired implants – BeardShell and Covenant.
After several years of using simple implants, the Russia-affiliated threat actor is back with two new sophisticated malware tools.
China-linked CL-STA-1087 targets Southeast Asian militaries since 2020 using AppleChris and MemFun for espionage and credential theft.
Iran-linked Dust Specter targeted Iraqi officials using fake ministry lures and new malware families uncovered by Zscaler.