APT28 deploys BEARDSHELL and COVENANT since April 2024 targeting Ukrainian military, enabling cloud-based espionage and persistent surveillance.
As enterprises increasing depend on cloud services, living off the land has evolved into living off the cloud.
Fake CAPTCHA attacks spiked by 563% last year: How to spot them before it's too late ...
Binary Defense, the trusted Managed Detection and Response (MDR) and enterprise defense provider, today announced the launch of NightBeacon, an AI-powered security operations platform built directly ...
Clickfix attacks surged 500% in early 2025. Cybercriminals now use AI in BEC scams. AI is making phishing harder to detect. Cybercriminals are shifting their techniques to focus on the human element, ...
A new ClickFix attack variant uses fake CAPTCHA pages instructing victims to paste and execute malicious commands in Windows Terminal.
The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation ...
"Living Off the Land" attacks use built-in tools and processes instead of traditional malware.
ESET researchers document how the Sednit APT group has reemerged with a modern toolkit centered on two paired implants – BeardShell and Covenant.
Your weekly cybersecurity roundup covering the latest threats, exploits, vulnerabilities, and security news you need to know.
For more than a year, a Russian-speaking threat actor targeted human resource (HR) departments with malware that delivers a new EDR killer named BlackSanta.
State-backed cyber threat actors from non-combatant states are taking advantage of the Israeli-US war on Iran to fulfil their own goals, according to Proofpoint analysts.