-
Security
/ 1 month agoWorm Targets Cloud Infrastructure for Criminal Operations
cybersecurity researchers have identified a large-scale, automated campaign exploiting cloud-native platforms to establish malicious infrastructure for future attacks. The worm-driven activity,...
-
Security
/ 1 month agoBloody Wolf Targets Uzbekistan, Russia with NetSupport RAT
A cyber threat actor known as Bloody Wolf has been identified as the source of a spear-phishing campaign targeting organizations in...
-
Security
/ 1 month agoCISOs Address Burnout and MTTR Without New Hires
Chief Information Security Officers (CISOs) at leading organizations are implementing new operational strategies to combat analyst burnout and improve security response...
-
Security
/ 1 month agoWeekly Cybersecurity Recap: AI Malware, DDoS Attacks, and Supply Chain Threats
Cyber threats are increasingly emerging from within the trusted tools and platforms that organizations rely on daily. This week, security researchers...
-
Security
/ 1 month agoOpenClaw Integrates VirusTotal to Scan ClawHub Skills for Security
The automation platform OpenClaw has integrated VirusTotal’s threat intelligence to scan all skills uploaded to its ClawHub marketplace. This partnership, announced...
-
Security
/ 1 month agoGerman Agencies Warn of Signal Phishing Targeting Officials
German security agencies have issued a joint warning about a sophisticated phishing campaign conducted over the Signal messaging application, targeting high-profile...
-
Security
/ 1 month agoAsian Cyber Espionage Group Breaches 70 Global Entities
A previously undocumented cyber espionage group, operating from Asia and backed by a state, has successfully infiltrated the networks of at...
-
Security
/ 1 month agoCISA Mandates Removal of Outdated Federal Network Devices
The U.S. cybersecurity and Infrastructure Security Agency (CISA) has directed federal agencies to identify and remove unsupported edge network devices from...
-
Security
/ 1 month agoChina-Linked DKnife Framework Hijacks Router Traffic for Malware
cybersecurity researchers have exposed a sophisticated adversary-in-the-middle framework, known as DKnife, which has been operated by threat actors linked to China...
-
Security
/ 1 month agoAI Model Discovers 500+ Critical Flaws in Open-Source Libraries
An artificial intelligence system has identified more than 500 previously unknown, high-severity security vulnerabilities across widely used open-source software libraries. The...

