A state-sponsored threat group tracked as "Kimsuky" sent QR-code-filled phishing emails to US and foreign organizations.
Iran-linked advanced persistent threat group MuddyWater has deployed a Rust-based implant in an ongoing espionage campaign ...
The FBI says Kimsuky APT, a North Korean state-backed hacking group, is using malicious QR codes to break into U.S.
The notorious Russian APT relies on basic techniques that are highly effective, often delivering greater ROI than more ...
The North Korean APT Kimsuky uses malicious QR codes in spear-phishing attacks targeting academics, government entities, and ...
A China-linked advanced persistent threat actor spent several years inside high-value telecommunications networks across ...
About Seceon Inc. Seceon Inc. provides AI-driven cybersecurity solutions through its Open Threat Management (OTM) Platform. Serving 9,300+ customers worldwide, Seceon is headquartered in Westford, ...
The China-linked Mustang Panda APT has been using a kernel-mode rootkit in attacks leading to ToneShell backdoor deployments.
A pair of deadly attacks this month, in Syria and Australia, has shone a fresh spotlight on the Islamic State, the militant group whose sudden rise to power in the ...
Cisco has alerted users to a maximum-severity zero-day flaw in Cisco AsyncOS software that has been actively exploited by a China-nexus advanced persistent threat (APT) actor codenamed UAT-9686 in ...