BeaverTail Phishing Campaign: The Threat of North Korean IT Workers
The rise of North Korean IT worker schemes has brought significant concerns, particularly with the emergence of the BeaverTail phishing...
The rise of North Korean IT worker schemes has brought significant concerns, particularly with the emergence of the BeaverTail phishing...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some...
Ilya Lichtenstein, the mastermind behind one of the largest cryptocurrency heists in history, has been sentenced to five years in...
Palo Alto Networks has issued a critical security advisory regarding a newly identified zero-day vulnerability affecting its firewall management interfaces,...
O2 has introduced an innovative solution in the battle against fraudulent calls: a human-like AI granny designed to outsmart scammers....
In an alarming revelation, watchTowr has identified a new zero-day vulnerability impacting Fortinet’s cybersecurity products, highlighting a serious security risk....
Ransomware groups are increasingly turning to cloud services to execute their malicious activities, posing a significant threat to IT security....
The cyber threat known as 'Sitting Ducks' has put over a million domains at risk due to DNS misconfigurations, making...
The Bank of England has revised its approach towards vulnerability disclosure rules for critical third party organizations, emphasizing cybersecurity resilience....
A significant telecom hack has compromised data of US officials, linking it to Chinese espionage efforts. Learn more about this...
Misconfigurations in Microsoft Power Pages are exposing sensitive data, highlighting the need for stronger security measures. Misconfigurations within Microsoft Power...
API security is becoming increasingly critical, with an alarming 83% of firms reporting security incidents. Understanding the vulnerabilities is key...
The cybercriminal group Hive0145 is actively targeting Europe using advanced Strela Stealer malware to compromise sensitive email credentials. Ongoing campaigns...
The Amazon MOVEit data leak has raised significant concerns over security practices, with the individual behind it claiming ethical motives....
The Lazarus Group has unveiled a new code smuggling technique that exploits custom extended attributes on macOS systems, evading conventional...
Google Cloud's latest insights highlight the escalating AI threat expected in 2025, emphasizing ongoing and new malicious uses of AI...
In November, Microsoft tackled significant security challenges, releasing updates for nearly 100 vulnerabilities, including four critical zero-days that demand immediate...
In a significant revelation, Halliburton has announced that a ransomware attack in August resulted in a staggering $35 million loss,...
In response to increasing breach risks and intensified boardroom scrutiny, CISOs are increasingly relying on personal indemnity insurance. Discover the...
A critical new Citrix zero-day vulnerability poses a threat by allowing unauthenticated remote code execution (RCE) through Citrix’s Session Recording...
North Korean hackers are creatively embedding malware in Flutter applications, targeting macOS devices in an unprecedented move. According to recent...
Discover how TA455, an Iranian-linked threat actor, is exploiting job recruitments to spread malware in the aerospace sector. This innovative...
The newly discovered phishing tool, GoIssue, poses a serious risk to GitHub users and the software development community at large....
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some...