by Beck Bailey | Feb 26, 2024 | RSS
Tips for mitigating the risks associated with these cyberattacks, which include cloud-environment intrusions, are provided.
by Beck Bailey | Feb 26, 2024 | RSS
Ukrainian entities based in Finland have been targeted as part of a malicious campaign distributing a commercial remote access trojan known as Remcos RAT using a malware loader called IDAT Loader. The attack has been attributed to a threat actor tracked by the...
by Beck Bailey | Feb 26, 2024 | RSS
More than 8,000 subdomains belonging to legitimate brands and institutions have been hijacked as part of a sophisticated distribution architecture for spam proliferation and click monetization. Guardio Labs is tracking the coordinated malicious activity, which has...
by Beck Bailey | Feb 26, 2024 | RSS
A set of fake npm packages discovered on the Node.js repository has been found to share ties with North Korean state-sponsored actors, new findings from Phylum show. The packages are named execution-time-async, data-time-utils, login-time-utils,...
by Beck Bailey | Feb 26, 2024 | RSS
Last year, the Open Worldwide Application Security Project (OWASP) published multiple versions of the “OWASP Top 10 For Large Language Models,” reaching a 1.0 document in August and a 1.1 document in October. These documents not only demonstrate the...
Recent Comments