Hackers Now Hiding ObliqueRAT Payload in Images to Evade Detection

Cybercriminals are now deploying remote access Trojans (RATs) under the guise of seemingly innocuous images hosted…

All your Cyber Resume Questions Answered

Community, I interviewed Cybersecurity recruiter Joe Hudson last week on SimplyCyber. He crushed so many questions…

SolarWinds Blames Intern for Weak Password That Led to Biggest Attack in 2020

As cybersecurity researchers continue to piece together the sprawling SolarWinds supply chain attack, top executives of…

Microsoft makes CodeQL queries public post SolarWinds attack

Microsoft has won praise from security researchers by making its  CodeQL queries public so any organization…

North Korean Hackers Targeting Defense Firms with ThreatNeedle Malware

A prolific North Korean state-sponsored hacking group has been tied to a new ongoing espionage campaign…

Chinese Hackers Using Firefox Extension to Spy On Tibetan Organizations

Cybersecurity researchers today unwrapped a new campaign aimed at spying on vulnerable Tibetan communities globally by…

Ransomware Attack Demonstration Video

This is a pretty good video explaining he preparation and process of a ransomware attack. It…

New ‘LazyScripter’ Hacking Group Targets Airlines

A recently identified threat actor that remained unnoticed for roughly two years appears focused on the…

10K Microsoft Email Users Hit in FedEx Phishing Attack

Microsoft users are receiving emails pretending to be from mail couriers FedEx and DHL Express –…

Sophisticated hackers snuck sleeper malware into nearly 30,000 Macs

There’s a popular stereotype that Apple’s computers are largely immune to malware. Not only is is…