Background and key findings Transparent Tribe, also known as PROJECTM and MYTHIC LEOPARD, is a highly prolific group whose activities can be traced as far back as 2013. Proofpoint published a very good article about them in 2016, and since that day, we have kept an eye on the group. We have periodically reported their…
A low-privileged process on a vulnerable machine could allow data harvesting and DoS.
A patch has been issued for the flaw in a widely-used module, and researchers are urging IoT manufacturers to update their devices ASAP.
The unique, advanced worming P2P botnet drops backdoors and cryptominers, and is spreading globally.
Up to 61 percent out of the IATA (International Air Transport Association) airline members do not have a published DMARC record.
Researchers reveal technology called SpiKey that can ‘listen’ to the clicks a key makes in a lock and create a duplicate from the sounds.
A recently uncovered, active campaign called “Duri” makes use of HTML smuggling to deliver malware.
Vulnerability management continues to challenge businesses, as they face tens of thousands of bugs with every scan.
The malware harvests AWS credentials and installs Monero cryptominers.
Juniper identifies phishing campaign targeting business customers with malware using password protection, among other techniques, to avoid detection.