î ‚May 31, 2024î „NewsroomCyber Attack / Credential Harvesting The Russian GRU-backed threat actor APT28 has been attributed as behind a series of c...
Category: Attack
OpenAI on Thursday disclosed that it took steps to cut off five covert influence operations (IO) originating from China, Iran, Israel, and Russi...
î ‚May 30, 2024î „NewsroomLinux / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw i...
î ‚May 30, 2024î „NewsroomCyber Attack / Malware Cloudflare on Thursday said it took steps to disrupt a month-long phishing campaign orchestrated by...
î ‚May 30, 2024î „NewsroomCyber Espionage / Threat Intelligence A previously undocumented cyber espionage-focused threat actor named LilacSquid has ...
î ‚May 30, 2024î „NewsroomVulnerability / Cryptocurrency The threat actors behind the RedTail cryptocurrency mining malware have added a recently di...
î ‚May 30, 2024î „NewsroomWordPress / Website Security Cybersecurity researchers have warned that multiple high-severity security vulnerabilities in...
Security leaders are in a tricky position trying to discern how much new AI-driven cybersecurity tools could actually benefit a security operati...
î ‚May 30, 2024î „NewsroomMalware / Cyber Crime Europol on Thursday said it shut down the infrastructure associated with several malware loader oper...
The U.S. Department of Justice (DoJ) on Wednesday said it dismantled what it described as "likely the world's largest botnet ever," which consis...
