Cybercriminals Methods

The Methods Cybercriminals Use to Get Your Users’ Passwords and Then Sell Them

The value of account credentials has increased in the cybercrime market since they are a common initial access vector. Consequently, your company’s entire network could be at risk from just one pair of compromised credentials. Data breaches that happened between November 2021 and October 2022…


0 Comments9 Minutes

Intel CPU vulnerability

A new Intel CPU vulnerability affects multi-tenant virtualized environments

Intel has swiftly responded to the critical Reptar vulnerability, extending its impact across desktops, mobile devices, and server CPUs. The company has promptly released comprehensive fixes to combat this issue effectively. This Intel CPU vulnerability, officially labelled CVE-2023-23583 with a…


0 Comments4 Minutes

GootBot malware

A new type of GootLoader malware is hard to catch and spreads quickly.

Researchers have discovered that non-privileged attackers are exploiting as many as 34 distinct Windows Driver Model (WDM) and Windows Driver Frameworks (WDF) drivers with vulnerabilities, enabling them to achieve complete control over the associated devices and execute any desired code on the…


0 Comments4 Minutes