Generative AI will enable anyone to launch sophisticated phishing attacks that only Next-generation MFA devices can stop The least surprising headline from...
Cybersecurity researchers have identified an updated version of a macOS information stealer called Atomic (or AMOS), indicating that the threat actors behind...
Cisco has released software updates to address a critical security flaw impacting Unity Connection that could permit an adversary to execute arbitrary...
Recently, there has been an emergence of a new scam targeting victims of ransomware attacks. This scam involves individuals or groups posing...
A new Mirai-based botnet called NoaBot is being used by threat actors as part of a crypto mining campaign since the beginning...
IT professionals have developed a sophisticated understanding of the enterprise attack surface – what it is, how to quantify it and how...
A decryptor for the Tortilla variant of the Babuk ransomware has been released by Cisco Talos, allowing victims targeted by the malware...
Microsoft has addressed a total of 48 security flaws spanning its software as part of its Patch Tuesday updates for January 2024....
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added six security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence...
A threat actor called Water Curupira has been observed actively distributing the PikaBot loader malware as part of spam campaigns in 2023....
Collaboration is a powerful selling point for SaaS applications. Microsoft, Github, Miro, and others promote the collaborative nature of their software applications...
Threat actors are resorting to YouTube videos featuring content related to cracked software in order to entice users into downloading an information...
In the rapidly evolving landscape of artificial intelligence, generative AI systems have become a cornerstone of innovation, driving advancements in fields ranging...
Threat actors operating under the name Anonymous Arabic have released a remote access trojan (RAT) called Silver RAT that’s equipped to bypass...
Cybersecurity is an infinite journey in a digital landscape that never ceases to change. According to Ponemon Institute1, “only 59% of organizations...
Telecommunication, media, internet service providers (ISPs), information technology (IT)-service providers, and Kurdish websites in the Netherlands have been targeted as part of...
The recent wave of cyber attacks targeting Albanian organizations involved the use of a wiper called No-Justice. The findings come from cybersecurity...
Cybersecurity researchers have discovered a new Apple macOS backdoor called SpectralBlur that overlaps with a known malware family that has been attributed...
Picture this: you stumble upon a concealed secret within your company’s source code. Instantly, a wave of panic hits as you grasp...
Mobile network operator Orange Spain suffered an internet outage for several hours on January 3 after a threat actor used administrator credentials...
Key Lesson from Microsoft’s Password Spray Hack: Secure Every Account
AWS Patches Critical ‘FlowFixation’ Bug in Airflow Service to Prevent Session Hijacking
China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws
Massive Sign1 Campaign Infects 39,000+ WordPress Sites with Scam Redirects
Russian Hackers May Have Targeted Ukrainian Telecoms with Upgraded ‘AcidPour’ Malware
AndroxGh0st Malware Targets Laravel Apps to Steal Cloud Credentials
Making Sense of Operational Technology Attacks: The Past, Present, and Future
Ivanti Releases Urgent Fix for Critical Sentry RCE Vulnerability
Atlassian Releases Fixes for Over 2 Dozen Flaws, Including Critical Bamboo Bug
TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks
Ukraine Arrests Trio for Hijacking Over 100 Million Email and Instagram Accounts
APIs Drive the Majority of Internet Traffic and Cybercriminals are Taking Advantage
From Deepfakes to Malware: AI’s Expanding Role in Cyber Attacks
Crafting and Communicating Your Cybersecurity Strategy for Board Buy-In
Suspected Russian Data-Wiping ‘AcidPour’ Malware Targeting Linux x86 Devices
New Phishing Attack Uses Clever Microsoft Office Trick to Deploy NetSupport RAT
New DEEP#GOSU Malware Campaign Targets Windows Users with Advanced Tactics
Fortra Patches Critical RCE Vulnerability in FileCatalyst Transfer Tool
Hackers Using Sneaky HTML Smuggling to Deliver Malware via Fake Google Sites
WordPress Admins Urged to Remove miniOrange Plugins Due to Critical Flaw