Russian hackers have been targeting government, defense, telecoms, and other organizations in a device code phishing campaign ...
First identified by cybersecurity firm Volexity in February 2022, the attack raises new concerns about vulnerabilities in corporate Wi-Fi system. In this case, APT28, tracked by Volexity as ...
It's time for a new security approach. Replace traditional security technology that exposes your attack surface and allows ...
Volexity highlighted how Russian nation-state actors are stealing Microsoft device authentication codes to compromise ...
The tech giant said the attack involves sending phishing emails that masquerade as Microsoft Teams meeting invitations that, ...
Experts from Volexity have published an in-depth report on a piece of malware called DeepData. This malware was used by a Chinese threat actor known as BrazenBamboo to steal login credentials ...
Earlier this month, researchers at Volexity reported that “mass exploitation” of the Ivanti Connect Secure vulnerabilities was underway, prompting CISA to release its first emergency directive ...
Researchers have uncovered a sustained and ongoing campaign by Russian spies that uses a clever phishing technique to hijack ...
Researchers at the Google Cloud-owned cybersecurity specialist confirmed findings from Volexity researchers about exploitation of the Connect Secure VPN vulnerabilities. Mandiant researchers ...
The “Nearest Neighbor Attack,” as reported by cybersecurity firm Volexity, illuminates a novel strategy that Russian state-sponsored Advanced Persistent Threat (APT) groups, such as GruesomeLarch ...
In a blog post, Volexity says that two zero-day vulnerabilities (CVE-2023-46805 and CVE-2024-21887) are being actively exploited to compromise ICS VPN appliances. "Exploitation of these ...