Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling
Cybersecurity researchers have called attention to a cyber attac…
Cybersecurity researchers have called attention to a cyber attac…
WhatsApp has addressed a security vulnerability in its messaging…
Three new security vulnerabilities have been disclosed in the Si…
Authorities from the Netherlands and the United States have anno…
Google has revealed that the recent wave of attacks targeting Sa…
Cybersecurity researchers have discovered a cybercrime campaign …
Cybersecurity researchers have discovered a loophole in the Visu…
Every day, businesses, teams, and project managers trust platfor…
The maintainers of the nx build system have alerted users to a s…
The U.S. Department of the Treasury's Office of Foreign Asse…
The financially motivated threat actor known as Storm-0501 has b…
Cybersecurity researchers have discovered five distinct activity…
Citrix has released fixes to address three security flaws in Net…
A team of academics has devised a novel attack that can be used …
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
A China-nexus threat actor known as UNC6384 has been attributed …
Docker has released fixes to address a critical security flaw af…
Cybersecurity researchers have flagged a new phishing campaign t…
Cybersecurity today moves at the pace of global politics. A sing…
Security Information and Event Management (SIEM) systems act as …
The advanced persistent threat (APT) actor known as Transparent …
Cybersecurity researchers have discovered a malicious Go module …
Cybersecurity researchers are calling attention to multiple camp…
INTERPOL on Friday announced that authorities from 18 countries …
Pentesting remains one of the most effective ways to identify re…
A 55-year-old Chinese national has been sentenced to four years …
A 20-year-old member of the notorious cybercrime gang known as S…
Apple has released security updates to address a security flaw i…
A Russian state-sponsored cyber espionage group known as Static …
Modern businesses face a rapidly evolving and expanding threat l…
North Korean threat actors have been attributed to a coordinated…
A 22-year-old man from the U.S. state of Oregon has been charged…
Threat actors are exploiting a nearly two-year-old security flaw…
The U.K. government has apparently abandoned its plans to force …
After two decades of developing increasingly mature security arc…
The maintainers of the Python Package Index (PyPI) repository ha…
The threat actors behind the Noodlophile malware are leveraging …
Cybersecurity researchers have lifted the lid on the threat acto…
Power doesn’t just disappear in one big breach. It slips away in…
Cybersecurity researchers have discovered a malicious package in…
Organizations handling various forms of sensitive data or person…
Cybersecurity researchers have detailed the inner workings of an…
The threat actor known as EncryptHub is continuing to exploit a …
A Chinese-speaking advanced persistent threat (APT) actor has be…
The U.S. Department of the Treasury's Office of Foreign Asse…
We used to think of privacy as a perimeter problem: about walls …
Cisco has released security updates to address a maximum-severit…
Cybersecurity researchers have disclosed a new Android trojan ca…
Story teaser text: Cybersecurity leaders face mounting pressure …
Google said it's implementing a new policy requiring develop…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
New research has uncovered Docker images on Docker Hub that cont…
Cybersecurity researchers are warning of a "significant spi…
An ongoing data extortion campaign targeting Salesforce customer…
A previously undocumented threat actor dubbed Curly COMrades has…
Most security tools can’t see what happens inside the browser, b…
The Dutch National Cyber Security Centre (NCSC-NL) has warned of…
This week, cyber attackers are moving quickly, and businesses ne…
The Evolution of Exposure Management Most security teams have a …
The maintainers of the WinRAR file archiving utility have releas…
A novel attack technique could be weaponized to rope thousands o…
Cybersecurity researchers have presented new findings related to…
Cybersecurity researchers have uncovered multiple security flaws…
Cybersecurity researchers have disclosed vulnerabilities in sele…
Cybersecurity researchers have uncovered a jailbreak technique t…
Cybersecurity researchers have discovered over a dozen vulnerabi…
A fresh set of 60 malicious packages has been uncovered targetin…
A newly discovered campaign dubbed GreedyBear has leveraged over…
The threat actors behind the SocGholish malware have been observ…
SonicWall has revealed that the recent spike in activity targeti…
Python is everywhere in modern software. From machine learning m…
Cybersecurity researchers have demonstrated an "end-to-end …
The malicious ad tech purveyor known as VexTrio Viper has been o…
Trend Micro has released mitigations to address critical securit…
The Computer Emergency Response Team of Ukraine (CERT-UA) has wa…
When Technology Resets the Playing Field In 2015 I founded a cyb…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA)…
In SaaS security conversations, “misconfiguration” and “vulnerab…
Why do SOC teams still drown in alerts even after spending big o…
Cybersecurity researchers have lifted the veil on a widespread m…
SonicWall said it's actively investigating reports to determ…
Some of the most devastating cyberattacks don’t rely on brute fo…
Everyone’s an IT decision-maker now. The employees in your organ…
Cybersecurity researchers have discovered a nascent Android remo…
Telecommunications organizations in Southeast Asia have been tar…
Cybersecurity researchers have flagged a previously undocumented…
SonicWall SSL VPN devices have become the target of Akira ransom…
Cybersecurity researchers have flagged a malicious npm package t…
Just as triathletes know that peak performance requires more tha…
The threat actor linked to the exploitation of the recently disc…