Malware Spreading via Binance Smart Contracts Blockchain
Cybercriminals are exploiting Binance smart contracts as intermediary C2 servers, favoring them due to their [...]
Cybercriminals are exploiting Binance smart contracts as intermediary C2 servers, favoring them due to their [...]
A new malicious code execution technique, GrimResource, targets Microsoft Management Console. Attackers exploit an old [...]
Threat actors leverage RATs for sustained access to compromised systems, facilitating prolonged espionage and exploitation. [...]
A critical vulnerability, CVE-2024-5806, in MOVEit Transfer software poses severe risks to organizations relying on [...]
A new threat actor has surfaced, claiming a zero-day vulnerability in the Linux GRUB bootloader [...]