Cyber Defense Advisors

Cyber Threat Trends

Truebot Malware Activity Increases With Possible Evil Corp Connections

The campaigns observed by Cisco Talos have resulted in the creation of two botnets

Cyber News, Cyber Threat Trends

Truebot Malware Activity Increases With Possible Evil Corp Connections

The campaigns observed by Cisco Talos have resulted in the creation of two botnets

Cyber News, Cyber Threat Trends

Truebot Malware Activity Increases With Possible Evil Corp Connections

The campaigns observed by Cisco Talos have resulted in the creation of two botnets

Cyber News, Cyber Threat Trends

BEC Attacks Expand Beyond Email and Toward Mobile Devices

Scammers typically obtain mobile numbers from data breaches, social media and data brokers

Cyber News, Cyber Threat Trends

BEC Attacks Expand Beyond Email and Toward Mobile Devices

Scammers typically obtain mobile numbers from data breaches, social media and data brokers

Cyber News, Cyber Threat Trends

BEC Attacks Expand Beyond Email and Toward Mobile Devices

Scammers typically obtain mobile numbers from data breaches, social media and data brokers

Cyber News, Cyber Threat Trends

Cobalt Mirage Affiliate Uses GitHub to Relay Drokbk Malware Instructions

Secureworks said the malicious code is written in .NET and comprises a dropper and a payload

Cyber News, Cyber Threat Trends

Cobalt Mirage Affiliate Uses GitHub to Relay Drokbk Malware Instructions

Secureworks said the malicious code is written in .NET and comprises a dropper and a payload

Cyber News, Cyber Threat Trends

Software Supply Chain Attacks Leveraging Open-Sources Repos Growing

ReversingLabs found an increasing number of malicious packages in three popular repositories

Cyber News, Cyber Threat Trends