North Korea’s Kimsuky Group Mimics Key Figures in Targeted Cyber Attacks
U.S. and South Korean intelligence agencies have issued a new alert warning of North Korean cyber actors' use of social...
U.S. and South Korean intelligence agencies have issued a new alert warning of North Korean cyber actors' use of social...
Spanish-speaking users in Latin America have been at the receiving end of a new botnet malware dubbed Horabot since at...
An analysis of the "evasive and tenacious" malware known as QBot has revealed that 25% of its command-and-control (C2) servers...
Data security is reinventing itself. As new data security posture management solutions come to market, organizations are increasingly recognizing the...
The Chinese nation-stage group known as Camaro Dragon has been linked to yet another backdoor that's designed to meet its...
U.S. and South Korean intelligence agencies have issued a new alert warning of North Korean cyber actors' use of social...
A critical flaw in Progress Software's in MOVEit Transfer managed file transfer application has come under widespread exploitation in the...
U.S. and South Korean intelligence agencies have issued a new alert warning of North Korean cyber actors' use of social...
Hackers are actively exploiting a zero-day vulnerability in the MOVEit Transfer file transfer software to steal data from organizations. MOVEit...
Russian cybersecurity firm Kaspersky says some iPhones on its network were hacked using an iOS vulnerability that installed malware via...
Harvard Pilgrim Health Care (HPHC) has disclosed that a ransomware attack it suffered in April 2023 impacted 2,550,922 people, with...
A previously unknown campaign involving the Hotabot botnet malware has targeted Spanish-speaking users in Latin America since at least November...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of...
An analysis of the "evasive and tenacious" malware known as QBot has revealed that 25% of its command-and-control (C2) servers...
Cybersecurity researchers have unmasked the identity of one of the individuals who is believed to be associated with the e-crime...
Researchers have discovered a novel attack on the Python Package Index (PyPI) repository that employs compiled Python code to sidestep...
A previously unknown advanced persistent threat (APT) is targeting iOS devices as part of a sophisticated and long-running mobile campaign...
A financially motivated threat actor is actively scouring the internet for unprotected Apache NiFi instances to covertly install a cryptocurrency...
A financially motivated threat actor is actively scouring the internet for unprotected Apache NiFi instances to covertly install a cryptocurrency...
The threat actors behind BlackCat ransomware have come up with an improved variant that prioritizes speed and stealth in an...
IT hygiene is a security best practice that ensures that digital assets in an organization's environment are secure and running...
Microsoft has shared details of a now-patched flaw in Apple macOS that could be abused by threat actors with root...
WordPress has issued an automatic update to address a critical flaw in the Jetpack plugin that's installed on over five...
Cybersecurity researchers have offered a closer look at the RokRAT remote access trojan that's employed by the North Korean state-sponsored...