downloads
-
Building a Robust Threat Intelligence with Wazuh
Threat intelligence refers to gathering, processing, and analyzing cyber threats, along with proactive defensive measures aimed at strengthening security. It…
Read More » -
200+ Malicious Android Apps Targeting Iranian Banks: Experts Warn
An Android malware campaign targeting Iranian banks has expanded its capabilities and incorporated additional evasion tactics to fly under the…
Read More » -
Alert: New WailingCrab Malware Loader Spreading via Shipping-Themed Emails
Delivery- and shipping-themed email messages are being used to deliver a sophisticated malware loader known as WailingCrab. “The malware itself…
Read More » -
AI Solutions Are the New Shadow IT
Ambitious Employees Tout New AI Tools, Ignore Serious SaaS Security Risks Like the SaaS shadow IT of the past, AI…
Read More » -
ClearFake Campaign Expands to Deliver Atomic Stealer on Mac Systems
The macOS information stealer known as Atomic is now being delivered to target via a bogus web browser update chain…
Read More » -
NetSupport RAT Infections on the Rise – Targeting Government and Business Sectors
Threat actors are targeting the education, government and business services sectors with a remote access trojan called NetSupport RAT. “The…
Read More »