The Python Package Index (PyPI) announced last week that every account that maintains a project on the...
Linux routers in Japan are the target of a new Golang remote access trojan (RAT) called GobRAT. “Initially,...
A new phishing technique called “file archiver in the browser” can be leveraged to “emulate” a file...
3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them
If you’re a cybersecurity professional, you’re likely familiar with the sea of acronyms our industry is obsessed...
A crypter (alternatively spelled cryptor) malware dubbed AceCryptor has been used to pack numerous strains of malware since 2016....