-
Security
/ 1 month agoHackers Target Central Asian Telecoms with New Backdoors
A cybersecurity threat group known as UnsolicitedBooker has shifted its focus to telecommunications providers in Central Asia, deploying previously unseen malware...
-
Security
/ 1 month agoLazarus Group Deploys Medusa Ransomware in Global Attacks
A state-sponsored hacking group linked to North Korea has been observed using a new ransomware variant in attacks against organizations in...
-
Security
/ 1 month agoIdentity Management Requires Risk-Based Approach, Experts Say
A fundamental shift is underway in how organizations should prioritize identity security work, moving away from traditional IT ticket methods toward...
-
Security
/ 1 month agoExposed LLM Endpoints Expand Corporate Attack Surface
The rapid internal deployment of Large Language Models (LLMs) by organizations worldwide is creating significant new cybersecurity vulnerabilities, according to industry...
-
Security
/ 1 month agoCybersecurity Threats Escalate with Skimmers, AI, and DDoS Attacks
cybersecurity threats escalated globally this week, with significant incidents targeting payment systems, artificial intelligence platforms, and critical internet infrastructure. Security researchers...
-
Security
/ 1 month agoWormable XMRig Campaign Uses BYOVD and Logic Bomb
<a href="https://delimiter.online/blog/apt28-webhook-malware/” title=”cybersecurity”>cybersecurity researchers have disclosed a new, sophisticated cryptojacking campaign that uses pirated software as a lure. The operation deploys...
-
Security
/ 1 month agoAPT28 Targets Europe with Webhook Macro Malware
A Russian state-sponsored hacking group has conducted a new cyber espionage campaign targeting specific organizations in Western and Central Europe. The...
-
Security
/ 1 month agoIranian Hackers Target MENA with New Malware Campaign
A state-sponsored Iranian hacking group has launched a new cyber espionage campaign targeting organizations and individuals across the Middle East and...
-
Security
/ 1 month agoMalicious npm Packages Steal Crypto Keys and API Tokens
cybersecurity researchers have identified an ongoing software supply chain attack targeting developers through the npm registry. The campaign, active as of...
-
Security
/ 1 month agoAI-Assisted Threat Actor Compromises 600 FortiGate Devices
A financially motivated, Russian-speaking threat actor has leveraged commercial generative artificial intelligence services to compromise more than 600 FortiGate network security...

