Nov 22, 2023NewsroomAuthentication Security / Windows A new research has uncovered multiple vulnerabilities that could be exploited to bypass ...
Category: Attack
Nov 22, 2023NewsroomCyber Espionage / Social Engineering North Korean threat actors have been linked to two campaigns in which they masquerade...
Ambitious Employees Tout New AI Tools, Ignore Serious SaaS Security RisksLike the SaaS shadow IT of the past, AI is placing CISOs and cybersecur...
Nov 22, 2023NewsroomSEO poisoning / Malware Analysis The macOS information stealer known as Atomic is now being delivered to target via a bogu...
Nov 22, 2023NewsroomThreat Analysis / Vulnerability Multiple threat actors, including LockBit ransomware affiliates, are actively exploiting a...
Nov 21, 2023NewsroomRansomware-as-a-service The ransomware strain known as Play is now being offered to other threat actors "as a service," ne...
Nov 21, 2023NewsroomMalware Threat / Data Privacy A new variant of the Agent Tesla malware has been observed delivered via a lure file with th...
Nov 21, 2023The Hacker NewsCybercrime / Malware Analysis Phishing attacks are steadily becoming more sophisticated, with cybercriminals invest...
Nov 21, 2023NewsroomLinux / Rootkit The Kinsing threat actors are actively exploiting a critical security flaw in vulnerable Apache ActiveMQ s...
Android smartphone users in India are the target of a new malware campaign that employs social engineering lures to install fraudulent apps that...