مقالات

مقالات
Western Intelligence Agencies Collaborate to Uncover Russian Cyber Operations Targeting Logistics and Technology Sectors

A prominent Russian hacking group has been held accountable for executing a significant cyber operation that officials indicate poses a…

مقالات
Microsoft Initiates Global Action Against Lumma Stealer: A Strategic Disruption of a Prominent Cybercrime Tool

Microsoft’s Digital Crimes Unit (DCU) has taken significant action against one of the most prevalent tools employed in the theft…

مقالات
3AM Ransomware Exploits Spoofed IT Communications and Email Bombing Techniques to Compromise Network Security

A recent investigation has unveiled the tactics employed by the 3AM ransomware affiliates, who are executing highly targeted attacks by…

مقالات
Disruption of Lumma Infostealer Malware Operation: Seizure of 2,300 Domains

Earlier this month, a highly coordinated disruption effort targeted the Lumma malware-as-a-service (MaaS) information stealer operation, resulting in the seizure…

مقالات
Cybercriminals Replicate Kling AI to Deploy Infostealer Malware

A recent malware campaign has been identified, leveraging the widespread popularity of the AI media platform, Kling AI. Security researchers…

مقالات
Malicious Chrome Extensions Imitating Fortinet, YouTube, and VPN Services Engage in Data Theft

A recent investigation has unveiled a sophisticated campaign targeting Google Chrome users, employing over 100 malicious browser extensions that masquerade…