Generative Data Intelligence

Tag: redline

Hackers Create Legit Phishing Links With Ghost GitHub, GitLab Comments

Hackers are using unpublished GitHub and GitLab comments to generate phishing links that appear to come from legitimate open source software (OSS) projects.The clever...

Top News

Nigerian Businesses Face Growing Ransomware-as-a-Service Trade

Ransomware-as-a-service looks set to fuel an increase in cyberattacks in Nigeria in the coming year, even as operational disruptions and recovery efforts already cost...

Complex ‘NKAbuse’ Malware Uses Blockchain to Hide on Linux, IoT Machines

A sophisticated and versatile malware called NKAbuse has been discovered operating as both a flooder and a backdoor, targeting Linux desktops in Colombia, Mexico,...

Evasive Jupyter Infostealer Campaign Showcases Dangerous Variant

Security researchers have spotted a recent increase in attacks involving a sophisticated new variant of Jupyter, an information stealer that has been targeting users...

Ducktail Infostealer, DarkGate RAT Linked to Same Threat Actors

Cybersecurity researchers have uncovered a connection between the notorious DarkGate remote access trojan (RAT) and the Vietnam-based financial cybercrime operation behind the Ducktail infostealer.WithSecure's...

‘Etherhiding’ Blockchain Technique Hides Malware in WordPress Sites

A threat actor has been abusing proprietary blockchain technology to hide malicious code in a campaign that uses fake browser updates to spread various malware,...

Anodot Unveils CostGPT to Help Businesses Better Manage Cloud Costs – Finovate

Analytics and monitoring solutions company Anodot has launched CostGPT to help businesses monitor cloud costs. Anodot’s CostGPT leverages AI to enable business managers...

Security Breach of $3 Million Hits Stars Arena Backed by Avalanche

Stars Arena, a social platform supported by Avalanche’s Contract Chain, recently faced a major security breach. The official Stars Arena Twitter account confirmed...

Stars Arena Drained of $2.85 Million, Declaring ‘War’ with Hackers – Decrypt

Stars Arena, a social platform backed by Avalanche’s Contract Chain, has been hit with what the project calls a “major security breach.”Launched last month...

Amid MGM, Caesars Incidents, Attackers Focus on Luxury Hotels

Even as the effects of the show-stopping cyberattacks on MGM Grand and Caesars are still being felt, attackers continue to target the hospitality industry...

Airbus Investigates Data Breach Affecting 3,200 Vendor Associates

Kamso Oguejiofor-Abugu Published on: September 15, 2023 In a recent cybersecurity incident, Airbus, the European aerospace titan, has...

Stealer Thugs Behind RedLine & Vidar Pivot to Ransomware

Two cybercriminal groups well-established in the business of spreading infostealers are diversifying their capabilities, abusing code-signing certificates to spread stealer malware, and then pivoting...

ESET Research Podcast: Sextortion, digital usury and SQL brute-force

ESET Research Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?