Plato Data Intelligence.
Vertical Search & Ai.

Tag: redline

Rescoms rides waves of AceCryptor spam

Last year ESET published a blogpost about AceCryptor – one of the most popular and prevalent cryptors-as-a-service (CaaS) operating since 2016. For H1 2023...

Top News

Evasive Jupyter Infostealer Campaign Showcases Dangerous Variant

Security researchers have spotted a recent increase in attacks involving a sophisticated new variant of Jupyter, an information stealer that has been targeting users...

Ducktail Infostealer, DarkGate RAT Linked to Same Threat Actors

Cybersecurity researchers have uncovered a connection between the notorious DarkGate remote access trojan (RAT) and the Vietnam-based financial cybercrime operation behind the Ducktail infostealer.WithSecure's...

Anodot Unveils CostGPT to Help Businesses Better Manage Cloud Costs – Finovate

Analytics and monitoring solutions company Anodot has launched CostGPT to help businesses monitor cloud costs. Anodot’s CostGPT leverages AI to enable business managers...

Security Breach of $3 Million Hits Stars Arena Backed by Avalanche

Stars Arena, a social platform supported by Avalanche’s Contract Chain, recently faced a major security breach. The official Stars Arena Twitter account confirmed...

Stars Arena Drained of $2.85 Million, Declaring ‘War’ with Hackers – Decrypt

Stars Arena, a social platform backed by Avalanche’s Contract Chain, has been hit with what the project calls a “major security breach.”Launched last month...

Airbus Investigates Data Breach Affecting 3,200 Vendor Associates

Kamso Oguejiofor-Abugu Published on: September 15, 2023 In a recent cybersecurity incident, Airbus, the European aerospace titan, has...

Stealer Thugs Behind RedLine & Vidar Pivot to Ransomware

Two cybercriminal groups well-established in the business of spreading infostealers are diversifying their capabilities, abusing code-signing certificates to spread stealer malware, and then pivoting...

ESET Research Podcast: Sextortion, digital usury and SQL brute-force

ESET Research Closing intrusion vectors force cybercriminals to revisit old attack avenues, but also to look for new ways to attack their victims...

The Dark Web Is Expanding (As Is the Value of Monitoring It)

Many security professionals today associate the Dark Web with named leaks, which are leaked credentials from employee password reuse. This is still a relevant...

Crypto Industry Ripe for Fradusters, BlackBerry Stops 1.5 Million Attacks in 2 Months: Report

Blackberry has detected several malware families that are being used to run massive campaigns for stealing crypto from devices. In the August edition of...

BlackBerry Unveils Top Cryptocurrency-Focused Malware Amid Rising Cyber Threats – Investor Bites

SNEAK PEEK SmokeLoader, RaccoonStealer, and Vidar are top cryptocurrency-focused malware. Finance, healthcare, and government are most targeted by cyberattacks. OpenAI allocates $1 million to...

You may not care where you download software from, but malware does

One of the pieces of advice that security practitioners have been giving out for the past couple of decades, if not longer, is that...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?