Cybercriminals are exploiting Binance smart contracts as intermediary C2 servers, favoring them due to their resilience against...
Exploitation
A new malicious code execution technique, GrimResource, targets Microsoft Management Console. Attackers exploit an old cross-site scripting...
Threat actors leverage RATs for sustained access to compromised systems, facilitating prolonged espionage and exploitation. North Korean...
A critical vulnerability, CVE-2024-5806, in MOVEit Transfer software poses severe risks to organizations relying on it for...
A new threat actor has surfaced, claiming a zero-day vulnerability in the Linux GRUB bootloader for local...