The ransomware industry surged in 2023 as it saw an alarming 55.5% increase in victims worldwide, reaching a staggering 5,070. But 2024 is…
Security
Threat hunters have discovered a new malware called Latrodectus that has been distributed as part of email phishing campaigns since at least…
A new phishing campaign has set its eyes on the Latin American region to deliver malicious payloads to Windows systems.…
Google has filed a lawsuit against two app developers for engaging in an “international online consumer investment fraud scheme” that tricked users…
Threat actors have been found exploiting a critical flaw in Magento to inject a persistent backdoor into e-commerce websites. The…
New research has found that artificial intelligence (AI)-as-a-service providers such as Hugging Face are susceptible to two critical risks that…
Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and…
Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional malware dubbed Byakugan. The starting point of the attack…
Multiple China-nexus threat actors have been linked to the zero-day exploitation of three security flaws impacting Ivanti appliances (CVE-2023-46805, CVE-2024-21887,…
Financial organizations in the Asia-Pacific (APAC) and Middle East and North Africa (MENA) are being targeted by a new version…
New research has found that the CONTINUATION frame in the HTTP/2 protocol can be exploited to conduct denial-of-service (DoS) attacks.…
Operational Technology (OT)Â refers to the hardware and software used to change, monitor, or control the enterprise’s physical devices, processes, and…
An updated version of an information-stealing malware called Rhadamanthys is being used in phishing campaigns targeting the oil and gas…
A suspected Vietnamese-origin threat actor has been observed targeting victims in several Asian and Southeast Asian countries with malware designed…
Ivanti has released security updates to address four security flaws impacting Connect Secure and Policy Secure Gateways that could result…
Google has disclosed that two Android security flaws impacting its Pixel smartphones have been exploited in the wild by forensic…
The U.S. Cyber Safety Review Board (CSRB) has criticized Microsoft for a series of security lapses that led to the…
Google on Tuesday said it’s piloting a new feature in Chrome called Device Bound Session Credentials (DBSC) to help protect…
Google Cloud has announced the appointment of Noor Al-Sulaiti as Head of Security Business Development and Government Relations for the…
Attack surface management (ASM) and vulnerability management (VM) are often confused, and while they overlap, they’re not the same. The…