مقالات

مقالات
Microsoft Initiates Global Action Against Lumma Stealer: A Strategic Disruption of a Prominent Cybercrime Tool

Microsoft’s Digital Crimes Unit (DCU) has taken significant action against one of the most prevalent tools employed in the theft…

مقالات
3AM Ransomware Exploits Spoofed IT Communications and Email Bombing Techniques to Compromise Network Security

A recent investigation has unveiled the tactics employed by the 3AM ransomware affiliates, who are executing highly targeted attacks by…

مقالات
Disruption of Lumma Infostealer Malware Operation: Seizure of 2,300 Domains

Earlier this month, a highly coordinated disruption effort targeted the Lumma malware-as-a-service (MaaS) information stealer operation, resulting in the seizure…

مقالات
Cybercriminals Replicate Kling AI to Deploy Infostealer Malware

A recent malware campaign has been identified, leveraging the widespread popularity of the AI media platform, Kling AI. Security researchers…

مقالات
Malicious Chrome Extensions Imitating Fortinet, YouTube, and VPN Services Engage in Data Theft

A recent investigation has unveiled a sophisticated campaign targeting Google Chrome users, employing over 100 malicious browser extensions that masquerade…

مقالات
Vulnerability in Google Cloud Functions Raises Significant Security Concerns

A potential privilege escalation vulnerability impacting Google Cloud Platform (GCP) Cloud Functions and its associated Cloud Build service has been…