Bumblebee and Latrodectus Malware Return with Sophisticated Phishing Strategies
Two malware families that suffered setbacks in the aftermath of a coordinated law enforcement operation called Endgame have resurfaced as...
Two malware families that suffered setbacks in the aftermath of a coordinated law enforcement operation called Endgame have resurfaced as...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a critical security flaw impacting ScienceLogic SL1 to its...
Nearly half of organizations, specifically 46%, are facing significant security challenges due to unmanaged long-lived cloud credentials, according to Datadog's...
In a troubling incident, the Nidec ransomware attack in August 2024 led to the exposure of over 50,000 sensitive documents...
Stolen access tokens have led to alarming security concerns for the Internet Archive, highlighting the need for rigorous cybersecurity measures....
The Bumblebee malware loader may be staging a comeback months after a major operation disrupted its activities in May 2024....
Australian businesses now have essential guidance on best practices for using commercial AI products, as outlined by the Office of...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Pentest Checklists Are More Important Than Ever Given the expanding attack surface coupled with the increasing sophistication of attacker tactics...
Hi there! Here's your quick update on the latest in cybersecurity. Hackers are using new tricks to break into systems...
The prolific Chinese nation-state actor known as APT41 (aka Brass Typhoon, Earth Baku, Wicked Panda, or Winnti) has been attributed...
Cybersecurity researchers have discovered severe cryptographic issues in various end-to-end encrypted (E2EE) cloud storage platforms that could be exploited to...
Social media accounts help shape a brand's identity and reputation. These public forums engage directly with customers as they are...
Unknown threat actors have been observed attempting to exploit a now-patched security flaw in the open-source Roundcube webmail software as...
In the modern enterprise, data security is often discussed using a complex lexicon of acronyms—DLP, DDR, DSPM, and many others....
A nascent threat actor known as Crypt Ghouls has been linked to a set of cyber attacks targeting Russian businesses...
Internet Archive has successfully resumed most of its services following a series of disruptive DDoS attacks that impacted its operations....
Instagram is taking proactive steps to enhance user safety by implementing new measures aimed at preventing sextortion scams on the...
Microsoft has identified a significant macOS vulnerability known as HM Surf, potentially exposing sensitive user data to attackers. Microsoft has...
In a significant development, a man has been arrested for his alleged role in the SEC X account hack that...
In Q3 2024, Microsoft was identified as the leading impersonated brand in phishing attacks, highlighting ongoing cybersecurity challenges. According to...
Picture your company's data as a vast, complex jigsaw puzzle—scattered across clouds, devices, and networks. Some pieces are hidden, some...
North Korean information technology (IT) workers who obtain employment under false identities in Western companies are not only stealing intellectual...
Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned about a year-long campaign undertaken by Iranian cyber...