All posts tagged "threat intelligence"
-
Security
/ 20 hours agoMicrosoft Details Linux Server Web Shells Using Cookies
Security researchers have identified a new method threat actors are using to maintain persistent access to compromised Linux servers. According to...
-
Security
/ 2 days agoSecurity Bulletin Details Critical Vulnerabilities and Attack Trends
Security researchers have published a comprehensive threat intelligence bulletin detailing over a dozen significant cybersecurity incidents and emerging attack methods from...
-
Security
/ 1 week agoCybersecurity Experts Study Art Forgery Tactics for Defense
Security researchers are examining historical art forgery techniques to develop new methods for detecting sophisticated cyberattacks. This cross-disciplinary approach draws direct...
-
Security
/ 3 weeks agoPhishing Attacks Now Target Security Teams’ Resources
cybersecurity professionals are reporting a significant shift in the tactics of advanced phishing campaigns. These campaigns are increasingly designed not only...
-
Security
/ 3 weeks agoAI-Generated Malware Slopoly Used in Ransomware Campaigns
cybersecurity researchers have identified a new, AI-assisted malware framework being deployed by a financially motivated threat group to maintain persistent access...
-
Security
/ 1 month agoGoogle Disrupts Major Chinese Cyber Espionage Campaign
Google, in collaboration with industry partners, successfully disrupted the infrastructure of a suspected state-backed Chinese cyber espionage group on Wednesday. The...
-
Security
/ 2 months agoNew Malware Framework Targets Tech and Finance Sectors
A previously unknown cyber threat actor has been deploying a sophisticated new malware framework against organizations in the technology and financial...
-
Security
/ 2 months agoAttackers Shift to Simpler, Stealthier Methods in Recent Threats
Security researchers this week reported a significant shift in the tactics of cyber attackers, with a move away from complex new...
-
Security
/ 2 months agoCybersecurity Threats Emerge from Developer Tools and Cloud Services
Security researchers have identified a series of emerging cyber threats targeting software development environments, remote administration tools, and cloud infrastructure. These...
-
Security
/ 2 months agoIran-Linked RedKitten Cyber Campaign Targets Human Rights Groups
A cyber espionage campaign linked to Iranian state interests has been targeting non-governmental organizations and activists involved in documenting human rights...

