The Intellexa Consortium was sanctioned by the U.S. Department of Treasury's Office of Foreign Assets Control (OFAC) last ...
Hackers linked to Russia have been exploiting a Windows bug for YEARS to deploy GooseEgg malware for escalating attack access ...
ToddyCat was first documented by the company in June 2022 in connection with a series of cyber attacks aimed at government ...
With enterprises using 53 different security solutions, why are breaches still a frequent reality? Unpack the paradox in our ...
MITRE, a top cybersecurity firm, breached by a nation-state. Zero-days and session hijacking were the weapons.
Major cybercrime groups are under attack by police. But are these takedowns effective? Some groups vanish, others bounce back ...
Researchers detail a flaw in the Windows DOS-to-NT path conversion process which can be exploited by threat actors to gain ...
North Korea's state-linked hackers are enhancing their operations with advanced artificial intelligence tools.
A new variant of the RedLine Stealer malware has been discovered, utilizing Lua bytecode for stealth and effectiveness.
Users of the CrushFTP enterprise file transfer software are being urged to update to the latest version following the ...
A critical vulnerability (CVE-2024-3400) in Palo Alto Networks PAN-OS is being actively exploited by threat actors.
An international law enforcement operation has busted LabHost, a notorious cybercrime service used for phishing attacks.