New Attack Technique Exploits Microsoft Management Console Files
Threat actors are exploiting a novel attack technique in the wild that leverages specially crafted management saved console (MSC) files...
Threat actors are exploiting a novel attack technique in the wild that leverages specially crafted management saved console (MSC) files...
WikiLeaks founder Julian Assange has been freed in the U.K. and has departed the country after serving more than five...
Multiple WordPress plugins have been backdoored to inject malicious code that makes it possible to create rogue administrator accounts with...
Four Vietnamese nationals with ties to the FIN9 cybercrime group have been indicted in the U.S. for their involvement in...
The organization managing the world’s largest stockpile of plutonium has pleaded guilty to all criminal charges, in a first-of-its-kind case...
Security researchers have warned against Rafel, an open-source remote administration tool (RAT) targeting Android devices. The investigation by Check Point Research...
Poland’s new government appears to be ramping up its investigation into allegations that the previous administration used notorious commercial spyware...
RedJuliett, a likely Chinese state-sponsored group, conducted cyber espionage campaigns targeting Taiwan from November 2023 to April 2024, according to...
Security researchers from Group-IB have unveiled the operations of a threat actor known as Boolka, whose activities involve deploying sophisticated...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Cybersecurity researchers have detailed a now-patch security flaw affecting the Ollama open-source artificial intelligence (AI) infrastructure platform that could be...
Google has developed a new framework called Project Naptime that it says enables a large language model (LLM) to carry...
Security researchers have disclosed a critical vulnerability (CVE-2024-36680) involving a premium Facebook module for PrestaShop named pkfacebook. The vulnerability has...
Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill's threat experts. Each...
A likely China-linked state-sponsored threat actor has been linked to a cyber espionage campaign targeting government, academic, technology, and diplomatic...
Multiple threat actors, including cyber espionage groups, are employing an open-source Android remote administration tool called Rafel RAT to meet...
Cryptocurrency exchange Kraken has said it is “coordinating with law enforcement” after security researchers allegedly attempted to extort the firm following...
A prolific threat actor has claimed to have breached tech giants AMD and Apple, stealing source code for internal tools,...
Russian-aligned threat actor Nobelium has been continuously targeting French diplomatic entities and public organizations since 2021, according to the French...
The US Cybersecurity and Infrastructure Security Agency (CISA) has revealed its Chemical Security Assessment Tool (CSAT) was breached by a...
Threat actors have published nearly 400GB of data stolen from pathology provider Synnovis, including sensitive NHS patient information, according to...
The notorious LockBit group has reemerged to become the most prominent ransomware actor in May 2024, according to a new...
The US government has banned cybersecurity provider Kaspersky from selling its products in the country because of the company’s alleged...
A new campaign is tricking users searching for the Meta Quest (formerly Oculus) application for Windows into downloading a new...