


5 BCDR Essentials for Effective Ransomware Defense
Read More Ransomware has evolved into a deceptive, highly coordinated and dangerously sophisticated threat capable of crippling organizations of any size. Cybercriminals now exploit even legitimate IT tools to infiltrate networks and launch ransomware attacks. In a...
Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers
Read More A Russia-linked threat actor has been attributed to a cyber espionage operation targeting webmail servers such as Roundcube, Horde, MDaemon, and Zimbra via cross-site scripting (XSS) vulnerabilities, including a then-zero-day in MDaemon, according to new...
Malicious npm Package Leverages Unicode Steganography, Google Calendar as C2 Dropper
Read More Cybersecurity researchers have discovered a malicious package named “os-info-checker-es6” that disguises itself as an operating system information utility to stealthily drop a next-stage payload onto compromised systems. “This campaign...