|
You are here |
www.sonatype.com | ||
| | | | |
www.proofpoint.com
|
|
| | | | | When distributing malware to potential victims, threat actors have various options for payload delivery. Malware can be attached to an email, or a direct link to the malicious file can be included | |
| | | | |
blog.talosintelligence.com
|
|
| | | | | * Cisco Talos has observed an unknown threat actor conducting a phishing campaign targeting Facebook business and advertising account users in Taiwan. * The decoy email and fake PDF filenames are designed to impersonate a company's legal department, attempting to lure the victim into downloading and executing malware. * This campaign abuses Google's | |
| | | | |
thehackernews.com
|
|
| | | | | Millions of malicious "imageless" containers have been planted on Docker Hub over the past 5 years in multiple cybercriminal campaigns. | |
| | | | |
www.space.com
|
|
| | | A new study suggests that fragments of biomolecules from ancient microbes could survive in Martian ice for tens of millions of years - long enough for future missions to potentially find them. | ||