News

The Initial Access Broker (IAB) known as Gold Melody has been attributed to a campaign that exploits leaked ASP.NET machine ...
The IT worker scheme, also tracked as Nickel Tapestry, Wagemole, and UNC5267, involves North Korean actors using a mix of ...
"Heap-based buffer overflow in Windows SPNEGO Extended Negotiation allows an unauthorized attacker to execute code over a ...
Hackers are exploiting Shellter’s leaked Elite license to distribute Lumma Stealer, SectopRAT, and more. This affects ...
AI accelerates security but needs human oversight to prevent risks like misconfigurations and compliance errors. Ensure AI ...
Chinese national Xu Zewei arrested in Milan for links to Silk Typhoon and cyber attacks on U.S. agencies, including Microsoft Exchange breaches ...
Anatsa banking malware targets North American users via Google Play, leading to credential theft and financial fraud ...
CISA adds four critical vulnerabilities to its KEV list, with active exploitation confirmed. Federal agencies must update by ...
Russian organizations have been targeted by Batavia spyware in a phishing attack, exfiltrating documents and system info.
According to data compiled by Kaspersky, small- and medium-sized businesses (SMBs) are being increasingly targeted by cyber ...
Major retailers like Adidas and The North Face were breached using identity-driven tactics, exposing key security gaps.
A newly released report by cybersecurity firm CTM360 reveals a large-scale scam operation utilizing fake news websites—known ...