If you run security at any reasonably complex organization, your validation stack probably looks something like this: a BAS tool in one corner. ...
Category: Attack
Ukrainian entities have emerged as the target of a new campaign likely orchestrated by threat actors linked to Russia, according to a report fro...
Ravie LakshmananMar 16, 2026Mobile Security / Data Protection Google is testing a new security feature as part of Android Advanced Protection ...
Ravie LakshmananMar 14, 2026Artificial Intelligence / Endpoint Security China's National Computer Network Emergency Response Technical Team (C...
Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that they say represents a "significant escalation" in how it p...
Ravie LakshmananMar 13, 2026Encryption / Data Protection Meta has announced plans to discontinue support for end-to-end encryption (E2EE) for ...
A suspected China-based cyber espionage operation has targeted Southeast Asian military organizations as part of a state-sponsored campaign that...
Ravie LakshmananMar 13, 2026Ransomware / Cybercrime INTERPOL on Friday announced the takedown of 45,000 malicious IP addresses and servers use...
Ravie LakshmananMar 13, 2026VPN Security / Malware Microsoft has disclosed details of a credential theft campaign that employs fake virtual pr...
Disclaimer: This report has been prepared by the Threat Research Center to enhance cybersecurity awareness and support the strengthening of defe...
