New Malware PG_MEM Targets PostgreSQL Databases for Crypto Mining
Cybersecurity researchers have unpacked a new malware strain dubbed PG_MEM that’s designed to mine cryptocurrency after brute-forcing their way into…
Gartner Spotlights AI, Security in 2024 Hype Cycle for Emerging Tech
The technologies listed in Gartner’s 2024 Hype Cycle for Emerging Technologies fall into four key areas: autonomous AI, developer productivity,…
Chinese Threat Actors Use MSI Files to Bypass Windows, VT Detection
Analysts have been picking up increased cases of malware delivery via Windows Installer files in Southeast Asia. Analysts have been…
‘Styx Stealer’ Blows Its Own Cover With Sloppy OpSec Mistake
An individual in Turkey is behind a new information stealer that researchers have recently observed in multiple attacks. An individual…
Taiwan University Under Fire From Unique DLL Backdoor
It’s unclear who the “Msupedge” threat actors were or what the motive for the attack was. It’s unclear who the…
Deadbeat Dad Hacks State Registry to Fake His Own Death
A Kentucky man used stolen doctor credentials to fake his own death certificate to avoid paying a six-figure child support…
North Korean Hackers Deploy New MoonPeak Trojan in Cyber Campaign
A new remote access trojan called MoonPeak has been discovered as being used by a state-sponsored North Korean threat activity…