Sharp Panda Using New Soul Framework Version to Target Southeast Asian Governments
High-profile government entities in Southeast Asia are the target of a cyber espionage campaign undertaken by a Chinese threat actor...
High-profile government entities in Southeast Asia are the target of a cyber espionage campaign undertaken by a Chinese threat actor...
As threats grow and attack surfaces get more complex, companies continue to struggle with the multitude of tools they utilize...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog,...
A pair of severe security vulnerabilities have been disclosed in the Jenkins open source automation server that could lead to...
The North Korea-linked Lazarus Group has been observed weaponizing flaws in an undisclosed software to breach a financial business entity...
Investing in digital identity can improve security, increase clinical productivity, and boost healthcare's bottom line. — by Gus Malezis, CEO...
Cybersecurity researchers have discovered a new information stealer dubbed SYS01stealer targeting critical government infrastructure employees, manufacturing companies, and other sectors....
Investing in digital identity can improve security, increase clinical productivity, and boost healthcare's bottom line. — by Gus Malezis, CEO...
A suspected Pakistan-aligned advanced persistent threat (APT) group known as Transparent Tribe has been linked to an ongoing cyber espionage...
An older version of Shein's Android application suffered from a bug that periodically captured and transmitted clipboard contents to a...
The massive breach at LastPass was the result of one of its engineers failing to update Plex on their home...
Europol has announced that law enforcement in Germany and Ukraine targeted two individuals believed to be core members of the...
The Federal Trade Commission (FTC) has proposed to ban the online counseling service BetterHelp from sharing its customers’ sensitive mental...
The seemingly innocuous Microsoft OneNote file has become a popular file format used by hackers to spread malware and breach...
Organizations rapidly adopt the cloud as they rely heavily on data and technology to drive their businesses. These organizations utilize...
A new phishing campaign targets organizations in Eastern European countries with the Remcos RAT malware with aid from an old...
The Sandbox blockchain game is warnings its community that a security incident caused some users to receive fraudulent emails impersonating...
An ongoing hacking campaign called 'Hiatus' targets DrayTek Vigor router models 2960 and 3900 to steal data from victims and...
A proof-of-concept for CVE-2023-21716, a critical vulnerability in Microsoft Word that allows remote code execution, has been published over the...
Deep fakes are expected to become a more prominent attack vector. Here's how to identify them. What are Deep Fakes?#...
A never-before-seen complex malware is targeting business-grade routers to covertly spy on victims in Latin America, Europe, and North America...
Law enforcement authorities from Germany and Ukraine have targeted suspected core members of a cybercrime group that has been behind...
Malicious actors can take advantage of "insufficient" forensic visibility into Google Cloud Platform (GCP) to exfiltrate sensitive data, a new...
A group of researchers has revealed what it says is a vulnerability in a specific implementation of CRYSTALS-Kyber, one of...