North Korean Hackers’ First Collaboration with Play Ransomware
A North Korean-backed hacking group has taken a significant step by engaging in a ransomware campaign, marking a notable shift...
A North Korean-backed hacking group has taken a significant step by engaging in a ransomware campaign, marking a notable shift...
The government sector is witnessing a troubling 236% surge in malware attacks, highlighting an urgent need for enhanced cybersecurity measures....
LottieFiles has revealed that its npm package "lottie-player" was compromised as part of a supply chain attack, prompting it to...
Cybersecurity researchers have discovered an improved version of an Apple iOS spyware called LightSpy that not only expands on its...
In the modern, browser-centric workplace, the corporate identity acts as the frontline defense for organizations. Often referred to as "the...
A high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could allow an unauthenticated threat...
The Midnight Blizzard spearphishing campaign poses a serious threat, targeting thousands with malicious RDP files and information-stealing tactics. Microsoft has...
The rise of FakeCall malware introduces a sophisticated vishing threat, putting mobile device security at risk. Understanding this malware is...
The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled its inaugural international strategic plan aimed at enhancing global collaboration in...
Apple has implemented vital security updates across its operating systems, enhancing protection against vulnerabilities in macOS and iOS. On October...
A newly discovered LiteSpeed Cache plugin vulnerability allows unauthorized users to gain admin access, impacting over 6 million WordPress sites....
Security concerns are ringing alarm bells as an alarming report reveals that many US county websites are at risk of...
Cybersecurity researchers have uncovered an ongoing malvertising campaign that abuses Meta's advertising platform and hijacked Facebook accounts to distribute information...
Threat actors in North Korea have been implicated in a recent incident that deployed a known ransomware family called Play,...
A now-patched security flaw in the Opera web browser could have enabled a malicious extension to gain unauthorized, full access...
Navigating the complexities of compliance frameworks like ISO 27001, SOC 2, or GDPR can be daunting. Luckily, Intruder simplifies the...
Cybersecurity researchers have discovered a new malicious Python package that masquerades as a cryptocurrency trading tool but harbors functionality designed...
A recent report from the UK's privacy watchdog reveals a concerning statistic: 55% of UK adults have experienced some form...
In an effort to bolster cybersecurity measures across the globe, the Five Eyes agencies have launched a new initiative focused...
LightSpy spyware has evolved, now posing significant risks to iOS devices with its enhanced capabilities and sophisticated structures. A newer...
A sophisticated phishing campaign led by Chenlun is currently targeting individuals through text messages that impersonate trusted brands such as...
The recent EU’s Network and Information Security (NIS2) Directive has significantly influenced business finances, compelling organizations to reevaluate their budget...
A global law enforcement operation has significantly disrupted the operations of Redline and Meta infostealers, notorious malware that has targeted...
As we approach COP29, it's crucial to remain aware of suspicious social media accounts that may spread misinformation. Here’s what...