Threat Intelligence

Cybercriminals Use Godot Engine to Spread Undetectable Malware Loader
Malware & Threats Cybercriminals Use Godot Engine to Spread Undetectable Malware Loader

Cybercriminals have developed an innovative approach to covertly deliver malware across various operating systems and platforms by creating a malware loader using the Godot Engine, an open-source game development tool. This malware loader, dubbed GodLoader, is distributed via the Stargazers Ghost

Why Cyber Leaders Trust MITRE ATT&CK for Evaluation and Guidance
Malware & Threats Why Cyber Leaders Trust MITRE ATT&CK for Evaluation and Guidance

In the rapidly evolving world of cybersecurity, maintaining an effective defense against ever-changing threats is an ongoing challenge that organizations must navigate. MITRE Engenuity's ATT&CK Evaluations have emerged as a crucial tool for cybersecurity leaders to assess their strategies

First Linux UEFI Bootkit Discovered, Marking Evolution in Malware Threats
Malware & Threats First Linux UEFI Bootkit Discovered, Marking Evolution in Malware Threats

In a groundbreaking development in cybersecurity, security researchers from ESET have uncovered the first-ever UEFI bootkit aimed at Linux systems, dubbed "Bootkitty." This discovery marks a significant shift in the landscape of UEFI bootkits, which were previously considered a threat

Is T-Mobile Winning the Battle Against Cyberattacks from China?
Malware & Threats Is T-Mobile Winning the Battle Against Cyberattacks from China?

In a world increasingly reliant on technology, cybersecurity has never been more critical, and T-Mobile US recently showcased a significant victory in this ever-evolving battle. The company announced measures that thwarted aggressive cyberattacks believed to be orchestrated by China's Salt

Are You Safe from Phishing Scams Exploiting Job Loss Fears?
Malware & Threats Are You Safe from Phishing Scams Exploiting Job Loss Fears?

A new phishing campaign has emerged, uniquely preying on widespread fears surrounding job security to trick recipients into downloading malware. This malicious scheme masquerades as a legal notice from the UK's Employment Tribunal, claiming that the recipient has been fired and must act

How Did RomCom Exploit Zero-Day Vulnerabilities in Firefox and Windows?
Malware & Threats How Did RomCom Exploit Zero-Day Vulnerabilities in Firefox and Windows?

In a recent campaign, the notorious Russia-aligned APT group RomCom exploited two zero-day vulnerabilities to deliver a backdoor to unsuspecting victims. The vulnerabilities in question were CVE-2024-9680 in Firefox and CVE-2024-49039 in Windows Task Scheduler. According to ESET researchers, these

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later