Redefining Cyber Extortion: ALPHV’s SEC Complaint Strategy
In a groundbreaking cyber extortion tactic, the ransomware group ALPHV (BlackCat) filed a complaint with the SEC against MeridianLink, leveraging new disclos...
In a groundbreaking cyber extortion tactic, the ransomware group ALPHV (BlackCat) filed a complaint with the SEC against MeridianLink, leveraging new disclos...
The LittleDrifter USB malware, initially targeting Ukraine, has alarmingly spread across several nations, highlighting the pervasive threat of state-sponsore...
The latest version of the LummaC2 malware, version 4.0, introduces an advanced anti-sandbox technique. This version uses trigonometry to track mouse movement...
Microsoft’s analysis reveals ‘Octo Tempest’, a cybercriminal group engaging in sophisticated social engineering, ransomware, and financial cyber threats, now...
The notorious Sandworm group, linked to Russia’s military intelligence, has compromised Ukrainian telecoms, highlighting critical vulnerabilities and emphasi...
AvosLocker ransomware intensifies its assault on critical US sectors, as national agencies alert of the increasing threat following a significant uptick in r...
iPhone zero-click Wi-Fi exploit is one of the most breathtaking hacks ever, Before Apple patch, Wi-Fi packets could steal photos. No interaction needed. Over...
Payment Processing Giant TSYS: Ransomware Incident ‘Immaterial’ to Company
For at least the third time in its existence, OGUsers — a forum overrun with people looking to buy, sell and trade access to compromised social media account...
Widespread malware campaign seeks to silently inject ads into search results, affects multiple browsers.
MuddyWater, identified as an Iranian APT group, has been covertly monitoring a Middle Eastern government for eight months, employing a suite of both custom a...
iPhone zero-click Wi-Fi exploit is one of the most breathtaking hacks ever, Before Apple patch, Wi-Fi packets could steal photos. No interaction needed. Over...
Industrial, factory and medical gear remain largely unpatched when it comes to the URGENT/11 and CDPwn groups of vulnerabilities.
Payment Processing Giant TSYS: Ransomware Incident ‘Immaterial’ to Company
For at least the third time in its existence, OGUsers — a forum overrun with people looking to buy, sell and trade access to compromised social media account...
Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems.
Attackers are targeting students and faculty alike with malware, phishing, DDoS, Zoom bombs and more, the FBI and CISA said.
Facebook says hackers backed by Vietnam’s government are linked to IT firm, Group is known for its robust, custom-made malware. IT firm says the link is a mi...
Widespread malware campaign seeks to silently inject ads into search results, affects multiple browsers.
Microsoft’s analysis reveals ‘Octo Tempest’, a cybercriminal group engaging in sophisticated social engineering, ransomware, and financial cyber threats, now...
Unprecedented collaboration among North Korean APT groups is reshaping the cyber threat landscape, with increased complexity and challenges for global cybers...
The notorious Sandworm group, linked to Russia’s military intelligence, has compromised Ukrainian telecoms, highlighting critical vulnerabilities and emphasi...
AvosLocker ransomware intensifies its assault on critical US sectors, as national agencies alert of the increasing threat following a significant uptick in r...
This research paper delves into the covert communications and data hiding techniques within network protocols, focusing on TCP/IP Steganography, Covert Timin...
MuddyWater, identified as an Iranian APT group, has been covertly monitoring a Middle Eastern government for eight months, employing a suite of both custom a...
Unprecedented collaboration among North Korean APT groups is reshaping the cyber threat landscape, with increased complexity and challenges for global cybers...
Industrial, factory and medical gear remain largely unpatched when it comes to the URGENT/11 and CDPwn groups of vulnerabilities.
Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems.
Attackers are targeting students and faculty alike with malware, phishing, DDoS, Zoom bombs and more, the FBI and CISA said.
Facebook says hackers backed by Vietnam’s government are linked to IT firm, Group is known for its robust, custom-made malware. IT firm says the link is a mi...
In response to a cyberattack, the City of Long Beach shut down parts of its IT network, sparking debate over the effectiveness and consequences of such drast...
In a groundbreaking cyber extortion tactic, the ransomware group ALPHV (BlackCat) filed a complaint with the SEC against MeridianLink, leveraging new disclos...
The LittleDrifter USB malware, initially targeting Ukraine, has alarmingly spread across several nations, highlighting the pervasive threat of state-sponsore...
The latest version of the LummaC2 malware, version 4.0, introduces an advanced anti-sandbox technique. This version uses trigonometry to track mouse movement...
Welcome everyone to the online version of The-Packet.
This research paper delves into the covert communications and data hiding techniques within network protocols, focusing on TCP/IP Steganography, Covert Timin...
In response to a cyberattack, the City of Long Beach shut down parts of its IT network, sparking debate over the effectiveness and consequences of such drast...