-
Security
/ 2 months agoAttackers Shift to Simpler, Stealthier Methods in Recent Threats
Security researchers this week reported a significant shift in the tactics of cyber attackers, with a move away from complex new...
-
Security
/ 2 months agoFirst Malicious Outlook Add-In Steals Thousands of Credentials
cybersecurity researchers have identified the first known malicious Microsoft Outlook add-in actively used in attacks, a novel supply chain compromise that...
-
Security
/ 2 months agoNorth Korean Hackers Use AI Lures in Crypto Attacks
A cyber threat group linked to North Korea has been observed targeting cryptocurrency organizations with a sophisticated campaign that leverages artificial...
-
Security
/ 2 months agoSSHStalker Botnet Targets Linux Systems Using Old Exploits
cybersecurity researchers have identified a new botnet operation, named SSHStalker, that is actively compromising Linux servers worldwide. The campaign utilizes the...
-
Security
/ 2 months agoMicrosoft Patches 59 Flaws, Six Exploited Zero-Days
Microsoft released a substantial set of security updates on Tuesday, addressing a total of 59 newly discovered vulnerabilities in its software...
-
Security
/ 2 months agoVulnerable Training Apps Risk Cloud Crypto-Mining Attacks
Security researchers have identified a significant risk where intentionally vulnerable training applications, if improperly deployed in corporate cloud environments, can be...
-
Security
/ 2 months agoMajor Vendors Release Critical Security Patches for Widespread Vulnerabilities
On the latest monthly Patch Tuesday, more than 60 software vendors, including major technology firms, have issued security updates to address...
-
Security
/ 2 months agoAPT36 and SideCopy Target Indian Entities with Cross-Platform RATs
Indian defense sector organizations and government-aligned entities have been targeted by multiple, sophisticated cyber campaigns designed to compromise both Windows and...
-
Security
/ 2 months agoNew Ransomware Uses Legitimate Drivers to Disable Security
cybersecurity researchers have identified a new ransomware family, named Reynolds, that incorporates a sophisticated technique to disable endpoint security tools on...
-
Security
/ 2 months agoNorth Korean Operatives Use Fake LinkedIn Profiles for Cyber Infiltration
Information technology workers linked to North Korea are applying for remote jobs using fraudulent LinkedIn profiles that impersonate real professionals. This...

