The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two security flaws to its Known Exploited Vulnerabilities (KEV)…
Development
A little-known cyber espionage actor known as The Mask has been linked to a new set of attacks targeting an…
2024 was a difficult year for healthcare cybersecurity, but there are some hopeful signs heading into 2025, with effective controls…
Bogus software update lures are being used by threat actors to deliver a new stealer malware called CoinLurker. “Written in…
Addressing cyber threats before they have a chance to strike or inflict serious damage is by far the best security…
A suspected South Asian cyber espionage threat group known as Bitter targeted a Turkish defense sector organization in November 2024…
Even the best companies with the most advanced tools can still get hacked. It’s a frustrating reality: you’ve invested in…
A new phishing campaign has been observed employing tax-themed lures to deliver a stealthy backdoor payload as part of attacks…
A new social engineering campaign has leveraged Microsoft Teams as a way to facilitate the deployment of a known malware…
In February 2024, Serbian journalist Slaviša Milanov was taken to a police station following what seemed like a routine traffic…
In episode 29 of The AI Fix, an AI company makes the bold step of urging us to “stop hiring…
Cyberattacks this year have escalated into a high-stakes battle, with increasingly advanced attacks targeting critical infrastructure, personal data, and corporate…
Meta Platforms, the parent company of Facebook, Instagram, WhatsApp, and Threads, has been fined €251 million (around $263 million) for…
The Cybersecurity and Infrastructure Security Agency (CISA) and the Office of the National Cyber Director (ONCD) have jointly published a…
INTERPOL is calling for a linguistic shift that aims to put to an end to the term “pig butchering,” instead…
BeyondTrust has disclosed details of a critical security flaw in Privileged Remote Access (PRA) and Remote Support (RS) products that…
While you’re enjoying the holiday season, cybercriminals could be gearing up for their next big attack – make sure your…
Across small-to-medium enterprises (SMEs) and managed service providers (MSPs), the top priority for cybersecurity leaders is to keep IT environments…
The Russia-linked APT29 threat actor has been observed repurposing a legitimate red teaming attack methodology as part of cyber attacks…
Threat actors are attempting to exploit a recently disclosed security flaw impacting Apache Struts that could pave the way for…