Hot Topics

Arid Viper Launches Mobile Espionage Campaign with AridSpy Malware

The threat actor known as Arid Viper has been attributed to a mobile espionage campaign that leverages trojanized Android apps to deliver a spyware strain dubbed AridSpy.

DarkGate Malware Replaces AutoIt with AutoHotkey in Latest Cyber Attacks

Cyber attacks involving the DarkGate malware-as-a-service (MaaS) operation have shifted away from AutoIt scripts to an AutoHotkey mechanism to deliver the last stages, underscoring continued efforts on the part of the threat actors to continuously stay ah

Bitcoin: Nearly 1 Billion Dollars in Inflows in One Week!

Last week, investment products backed by digital assets such as Bitcoin saw nearly 1 billion dollars in net inflows. A massive influx driven by growing expectations of an impending relaxation of strict monetary conditions in the United States. A surge of

The Fundamentals of Cloud Security Stress Testing

״Defenders think in lists, attackers think in graphs," said John Lambert from Microsoft, distilling the fundamental difference in mindset between those who defend IT systems and those who try to compromise them.

10 Critical Endpoint Security Tips You Should Know

In today's digital world, where connectivity is rules all, endpoints serve as the gateway to a business's digital kingdom. And because of this, endpoints are one of hackers' favorite targets.

Will Norway’s new regulations drive Bitcoin miners away?

How will Norway’s crackdown on crypto mining impact the global Bitcoin market and the country’s economy?