Blog

Blog
Emerging Linux Vulnerabilities Reveal Password Hashes through Core Dumps

Two local information-disclosure vulnerabilities have been identified in widely-used Linux crash-reporting tools, enabling potential attackers to gain access to sensitive…

Blog
“Emergence of the ‘Russian Market’ as a Principal Source for Compromised Credentials”

The “Russian Market” cybercrime marketplace has gained significant traction as a prominent platform for trading credentials compromised by information stealer…

Blog
Operator of Iranian Robbinhood Ransomware Pleads Guilty in Attacks on U.S. Cities

A ransomware operator associated with the sophisticated Robbinhood strain has entered a guilty plea for orchestrating significant cyberattacks against various…

Blog
Potential AsyncRAT Infection Risk Following Redirection to Fraudulent Booking.com Domains

Cybercriminals have launched a campaign targeting users on gaming websites and social media platforms, as well as promoted through sponsored…

Blog
Akira Fails to Uphold Commitments to Affected Parties — SuspectFile

Over the past week, SuspectFile has delved into the implications of the ransomware group Akira’s alleged deception toward its victims….

Blog
Dutch Police Lead Shutdown of Counter AV Service AVCheck

European and American law enforcement agencies have successfully dismantled one of the most significant Counter Antivirus (CAV) services in operation,…