Blog

Blog
3AM Ransomware Exploits Spoofed IT Communications and Email Bombing Techniques to Compromise Network Security

A recent investigation has unveiled the tactics employed by the 3AM ransomware affiliates, who are executing highly targeted attacks by…

Blog
Disruption of Lumma Infostealer Malware Operation: Seizure of 2,300 Domains

Earlier this month, a highly coordinated disruption effort targeted the Lumma malware-as-a-service (MaaS) information stealer operation, resulting in the seizure…

Blog
Cybercriminals Replicate Kling AI to Deploy Infostealer Malware

A recent malware campaign has been identified, leveraging the widespread popularity of the AI media platform, Kling AI. Security researchers…

Blog
Malicious Chrome Extensions Imitating Fortinet, YouTube, and VPN Services Engage in Data Theft

A recent investigation has unveiled a sophisticated campaign targeting Google Chrome users, employing over 100 malicious browser extensions that masquerade…

Blog
Vulnerability in Google Cloud Functions Raises Significant Security Concerns

A potential privilege escalation vulnerability impacting Google Cloud Platform (GCP) Cloud Functions and its associated Cloud Build service has been…

Blog
Security Researchers Extract and Disseminate 2 Billion Discord Messages Online

Researchers have released an extensive database comprising over 2 billion messages from Discord. This data was extracted through the utilization…