APT-K-47, aka Mysterious Elephant, exploits Hajj themes and Asyncshell malware in Pakistan-targeted cyberattacks.
A China-linked nation-state group called TAG-112 compromised Tibetan media and university websites in a new cyber espionage ...
TAG-110's use of HATVIBE and CHERRYSPY was first documented by CERT-UA back in late May 2023 in connection with a cyber ...
This article underscores the importance of having a reliable backup for your Google Workspace data. Learn more.
Microsoft, Meta, and DOJ disrupt global cybercrime operations, including ONNX phishing scams and PopeyeTools fraud.
Palo Alto Networks, which is tracking the initial zero-day exploitation of the flaws under the name Operation Lunar Peek, ...
The China-aligned advanced persistent threat (APT) actor known as Gelsemium has been observed using a new Linux backdoor ...
North Korea exploits fake IT firms and workers globally to fund weapons programs, evade sanctions, and conduct cyberattacks.
Learn why Automated Security Validation is critical for cybersecurity, addressing false positives and hidden threats.
Cybersecurity researchers have discovered two malicious packages uploaded to the Python Package Index (PyPI) repository that impersonated popular artificial intelligence (AI) models like OpenAI ...
Critical Ubuntu needrestart flaws allow local root privilege escalation; update immediately to safeguard systems.
The technique, codenamed Ghost Tap by ThreatFabric, enables cybercriminals to cash-out money from stolen credit cards linked ...