The state-sponsored hackers deployed custom tools and stayed dormant in the compromised environments for months.
As users (and detection tools) have gotten better at identifying the signs of a malware infection and savvy enough to avoid them in the first place, some cybercriminals have changed tactics.
Around the same time the Stryker attack came to light, posts to a Telegram account and website controlled by Handala Hack ...
AI-generated Slopoly malware used by Hive0163 in 2026 attacks maintained access for over a week, highlighting how AI ...
For more than a year, a Russian-speaking threat actor targeted human resource (HR) departments with malware that delivers a new EDR killer named BlackSanta.
Districts bolster physical security by screening guests with visitor management software and integrating that with door access control and surveillance cameras. When IT Services Director Bob Fishtrom ...
After several years of using simple implants, the Russia-affiliated threat actor is back with two new sophisticated malware tools.
Cork Cyber's Software Installer Scripts enable MSPs to generate dynamic installer scripts for vulnerable & outdated ...
Signed malware backed by a stolen EV certificate deployed legitimate RMM tools to gain persistent access inside enterprise ...
Microsoft has identified a phishing campaign using malformed links to legitimate OAuth services to redirect to malware ...
Discover the 7 best cloud orchestration tools for enterprises in 2026, including AWS CloudFormation, Ansible, Spacelift, CloudBolt, and more. Compare features, pricing, multi-cloud support, and use ...