All posts tagged "cybersecurity"
-
Security
/ 2 months agoBloody Wolf Targets Uzbekistan, Russia with NetSupport RAT
A cyber threat actor known as Bloody Wolf has been identified as the source of a spear-phishing campaign targeting organizations in...
-
Security
/ 2 months agoCISOs Address Burnout and MTTR Without New Hires
Chief Information Security Officers (CISOs) at leading organizations are implementing new operational strategies to combat analyst burnout and improve security response...
-
Security
/ 2 months agoWeekly Cybersecurity Recap: AI Malware, DDoS Attacks, and Supply Chain Threats
Cyber threats are increasingly emerging from within the trusted tools and platforms that organizations rely on daily. This week, security researchers...
-
Security
/ 3 months agoOpenClaw Integrates VirusTotal to Scan ClawHub Skills for Security
The automation platform OpenClaw has integrated VirusTotal’s threat intelligence to scan all skills uploaded to its ClawHub marketplace. This partnership, announced...
-
Security
/ 3 months agoGerman Agencies Warn of Signal Phishing Targeting Officials
German security agencies have issued a joint warning about a sophisticated phishing campaign conducted over the Signal messaging application, targeting high-profile...
-
Security
/ 3 months agoCISA Mandates Removal of Outdated Federal Network Devices
The U.S. cybersecurity and Infrastructure Security Agency (CISA) has directed federal agencies to identify and remove unsupported edge network devices from...
-
Security
/ 3 months agoChina-Linked DKnife Framework Hijacks Router Traffic for Malware
cybersecurity researchers have exposed a sophisticated adversary-in-the-middle framework, known as DKnife, which has been operated by threat actors linked to China...
-
Security
/ 3 months agoSamsung Knox Addresses Mobile Security in Evolving Enterprise Networks
Enterprise network security has undergone significant evolution over the past decade, with more intelligent firewalls, advanced threat detection, and detailed access...
-
Security
/ 3 months agoIranian Hackers Resume Operations with New Infrastructure
A sophisticated Iranian cyber threat group has resumed its activities with updated infrastructure, following a period of reduced visibility that coincided...
-
Security
/ 3 months agoAI Security Gap Widens as Enterprise Use Outpaces Controls
A significant gap has emerged between the rapid adoption of artificial intelligence tools in business environments and the security measures designed...

