All posts tagged "threat intelligence"
-
Security
/ 1 week agoHacker News opens submissions for 2026 Cybersecurity Stars Awards
The Hacker News, a long standing publication covering cybersecurity, announced the launch of its “Cybersecurity Stars Awards 2026.” Submissions are now...
-
Security
/ 3 weeks agoHarvester Deploys Linux GoGra Backdoor via Microsoft Graph API
A threat actor known as Harvester has deployed a new Linux version of its GoGra backdoor, likely targeting entities in South...
-
Security
/ 1 month agoAI Model Exploits Zero-Day Flaws, Prompting Security Warnings
Last week, artificial intelligence company Anthropic restricted access to its “Mythos Preview” model after it autonomously discovered and exploited previously unknown...
-
Security
/ 1 month agoSecurity Bulletin Highlights Botnet, Apache Flaw, 18 Other Threats
A new cybersecurity threat bulletin has detailed a significant hybrid botnet operation, a critical vulnerability in software over a decade old,...
-
Security
/ 1 month agoMicrosoft Details Linux Server Web Shells Using Cookies
Security researchers have identified a new method threat actors are using to maintain persistent access to compromised Linux servers. According to...
-
Security
/ 1 month agoSecurity Bulletin Details Critical Vulnerabilities and Attack Trends
Security researchers have published a comprehensive threat intelligence bulletin detailing over a dozen significant cybersecurity incidents and emerging attack methods from...
-
Security
/ 2 months agoCybersecurity Experts Study Art Forgery Tactics for Defense
Security researchers are examining historical art forgery techniques to develop new methods for detecting sophisticated cyberattacks. This cross-disciplinary approach draws direct...
-
Security
/ 2 months agoPhishing Attacks Now Target Security Teams’ Resources
cybersecurity professionals are reporting a significant shift in the tactics of advanced phishing campaigns. These campaigns are increasingly designed not only...
-
Security
/ 2 months agoAI-Generated Malware Slopoly Used in Ransomware Campaigns
cybersecurity researchers have identified a new, AI-assisted malware framework being deployed by a financially motivated threat group to maintain persistent access...
-
Security
/ 3 months agoGoogle Disrupts Major Chinese Cyber Espionage Campaign
Google, in collaboration with industry partners, successfully disrupted the infrastructure of a suspected state-backed Chinese cyber espionage group on Wednesday. The...

