The Interpol (International Criminal Police Organisation) warns of fraudsters targeting dating app users and attempting to trick them into investing through fake trading apps. […]
Posts Written ByThreatRavens
The post-compromise backdoor installs Cobalt Strike to help attackers more laterally through victim networks.
Israel-based security consultancy firm JSOF disclosed today seven Dnsmasq vulnerabilities, collectively known as DNSpooq, that can be exploited to launch DNS cache poisoning and remote code execution against millions of affected devices. […]
The FreakOut malware is adding infected Linux devices to a botnet, in order to launch DDoS and cryptomining attacks.
Best practices for a shifting visibility landscape.
Users of the Linux-based open-source firmware—which include developers from commercial router companies–may be targeted by phishing campaigns, administrators warn.
The supply chain threat was just the beginning.
QR codes are very common today, enough so that attackers are discovering ways of using them for profit. How can QR codes be used this way, and what can you…
An active malicious campaign is currently targeting Linux devices running software with critical vulnerabilities that is powering network-attached storage (NAS) devices or for developing web applications and portals. […]