From Misuse to Abuse: AI Risks and Attacks
AI from the attacker's perspective: See how cybercriminals are leveraging AI and exploiting its vulnerabilities to compromise systems, users, and...
AI from the attacker's perspective: See how cybercriminals are leveraging AI and exploiting its vulnerabilities to compromise systems, users, and...
The North Korean threat actor known as ScarCruft has been linked to the zero-day exploitation of a now-patched security flaw...
A new spear-phishing campaign targeting Brazil has been found delivering a banking malware called Astaroth (aka Guildma) by making use...
To defend your organization against cyber threats, you need a clear picture of the current threat landscape. This means constantly...
GitHub has released security updates for Enterprise Server (GHES) to address multiple issues, including a critical bug that could allow...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
New variants of an Android banking trojan called TrickMo have been found to harbor previously undocumented features to steal a...
Cybersecurity researchers have disclosed a new malware campaign that leverages a malware loader named PureCrypter to deliver a commodity remote...
North Korean threat actors have been observed using a Linux variant of a known malware family called FASTCash to steal...
China's National Computer Virus Emergency Response Center (CVERC) has doubled down on claims that the threat actor known as the...
In recent years, the number and sophistication of zero-day vulnerabilities have surged, posing a critical threat to organizations of all...
The maintainers of the Jetpack WordPress plugin have released a security update to remediate a critical vulnerability that could allow...
Cybersecurity researchers have disclosed a new malware campaign that delivers Hijack Loader artifacts that are signed with legitimate code-signing certificates....
Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm, Ruby Gems, NuGet,...
Hey there, it's your weekly dose of "what the heck is going on in cybersecurity land" – and trust me,...
A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance (CSA) a zero-day to...
The link between detection and response (DR) practices and cloud security has historically been weak. As global organizations increasingly adopt...
The Iranian threat actor known as OilRig has been observed exploiting a now-patched privilege escalation flaw impacting the Windows Kernel...
Threat actors are actively attempting to exploit a now-patched security flaw in Veeam Backup & Replication to deploy Akira and...
A new tax-themed malware campaign targeting insurance and finance sectors has been observed leveraging GitHub links in phishing email messages...
The U.S. Department of Justice (DoJ) has announced arrests and charges against several individuals and entities in connection with allegedly...
Threat actors constantly change tactics to bypass cybersecurity measures, developing innovative methods to steal user credentials. Hybrid password attacks merge...
A vulnerability was identified in Mozilla Products. A remote attacker could exploit this vulnerability to trigger remote code execution on...