New research has found that the DOS-to-NT path conversion process could be exploited by threat actors to achieve rootkit-like capabilities…
Development
The MITRE Corporation revealed that it was the target of a nation-state cyber attack that exploited two zero-day flaws in…
Between crossovers – Do threat actors play dirty or desperate? In our dataset of over 11,000 victim organizations that have…
The threat actor known as ToddyCat has been observed using a wide range of tools to retain access to compromised environments and steal valuable data.…
Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have been compromised by a…
The Russia-linked nation-state threat actor tracked as APT28 weaponized a security flaw in the Microsoft Windows Print Spooler component to deliver a…
The U.S. Department of State on Monday said it’s taking steps to impose visa restrictions on 13 individuals who are allegedly involved in the…
German authorities said they have issued arrest warrants against three citizens on suspicion of spying for China. The full names…
Cybersecurity breaches can be devastating for both individuals and businesses alike. While many people tend to focus on understanding how and why…
European Police Chiefs said that the complementary partnership between law enforcement agencies and the technology industry is at risk due…
In the high-stakes world of cybersecurity, the battleground has shifted. Supply chain attacks have emerged as a potent threat, exploiting…
Researchers have identified a dependency confusion vulnerability impacting an archived Apache project called Cordova App Harness. Dependency confusion attacks take place owing…
A new ongoing malware campaign has been observed distributing three different stealers, such as CryptBot, LummaC2, and Rhadamanthys hosted on Content Delivery Network (CDN) cache domains since…
A new malware campaign has been exploiting the updating mechanism of the eScan antivirus software to distribute backdoors and cryptocurrency…
Security vulnerabilities uncovered in cloud-based pinyin keyboard apps could be exploited to reveal users’ keystrokes to nefarious actors. The findings come…
Dinesh Kumar Shrimali has become the Chief Information Security Officer (CISO) and Data Protection Officer (DPO) of Tata Steel Ltd.,…
Cybersecurity researchers have discovered an ongoing attack campaign that’s leveraging phishing emails to deliver a malware called SSLoad. The campaign, codenamed FROZEN#SHADOW by Securonix,…
The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Monday sanctioned two firms and four individuals for their involvement in…
The South Korean National Police Agency sounded an alarm Tuesday for a targeted campaign from the North Korean hacker groups…
Central Power Systems & Services, a major distributor of industrial and power generation products in Kansas, Western Missouri, and Northern…