A new multi-stage trojan, “Orcinius,” exploits Dropbox and Google Docs. It starts with an Excel spreadsheet containing...
Internet Security
A vulnerability in an unauthenticated endpoint allowed threat actors to identify phone numbers associated with Authy accounts....
Transparent Tribe (aka APT36), active since 2016, uses social engineering to target Indian government and military personnel....
Google has launched kvmCTF, a new vulnerability reward program targeting the Kernel-based Virtual Machine (KVM) hypervisor. Announced...
Cybercriminals are exploiting Binance smart contracts as intermediary C2 servers, favoring them due to their resilience against...