Generative Data Intelligence

Tag: threat intelligence

New TrickBot Module Bruteforces RDP Connections, Targets Select Telecommunication Services in US and Hong Kong

Bitdefender researchers have discovered a new TrickBot module (rdpScanDll) built for RDP bruteforcing operations on select targets. The new module was discovered...

Cyber Attack risk on IoT devices is too high says report

A recent study conducted by Unit 42, a threat intelligence platform of Palo Alto Networks has confirmed that the risk of...

Ursnif campaign targets Italy with a new infection Chain

Malware researchers from Cybaze-Yoroi ZLab have uncovered a new Ursnif campaign that is targeting Italy with a new infection chain. Introduction Ursnif is...

How Mature Is Your Threat Intelligence?

The not-for-profit accreditation and certification body for the technical security industry, has developed a new maturity assessment tool for Cyber Threat Intelligence (CTI)...

Playing the infinite game with threat intelligence and cyber fusion

“We can know only that we know nothing. And that is the highest degree of human wisdom.” ― Leo Tolstoy, War and Peace. True...

Cyber investment exec talks COVID-19, Snowden and rise of threat intel automation

The cyber threat intelligence tech space has made significant leaps in the last few years, becoming far less manual, according to Hank...

Password found to rescue victims of malicious COVID-19 tracker app

Members of the cybersecurity and IT community have successfully obtained a password key for victims of the malicious CovidLock Android app, which...

Fake Coronavirus Tracking App For Android Locks Up The Device

We recently reported how hackers were abusing the deadly Coronavirus (COVID-19) pandemic to their advantage by exploiting the Coronavirus Maps to steal user...

Phishing is a huge concern among security decision-makers and influencers

A serious disconnect exists between how decision makers (i.e., CISOs, CIOs and CEOs), and security practitioners (i.e., IT managers and directors, security architects...

Week in review: Trojanized hacking tools, coronavirus scams, (IN)SECURE Magazine special issue

Here’s an overview of some of last week’s most interesting news, articles and podcasts: The haphazard response to COVID-19 demonstrates the value of enterprise...

Coronavirus tracking app locks up Android phones for ransom

A malicious Android app that supposedly helps track cases of the coronavirus actually locks users’ phones and demands a ransom in order...

Flaws in the Popup Builder WordPress plugin expose 100K+ websites to hack

Flaws in the Popup Builder WordPress plugin could allow unauthenticated attackers to inject malicious JavaScript code into popups of 100K+ websites. The Popup...

Latest Intelligence

spot_img
spot_img
spot_img