North Korean IT workers have intensified their global operations, expanding their employment footprint across Europe to infiltrate corporate networks and…
The Israeli Internet Association has issued a public warning about a surge in cyberattacks targeting Telegram accounts in Israel. The…
The notorious Gootloader malware has resurfaced with a new campaign that combines old tactics with modern delivery methods. This latest…
A persistent Linux malware known as "Outlaw" has been identified leveraging unsophisticated yet effective techniques to maintain a long-running botnet.…
The Sliver Command & Control (C2) framework, an open-source tool written in Go, has been a popular choice for offensive…
Ransomware continues to be one of the most disruptive cyber threats, with recent data revealing that it affects 93% of…
As the U.S. tax filing deadline approaches, cybercriminals are intensifying their efforts to exploit taxpayers through a new wave of…
Cybersecurity experts at eSentire's Threat Response Unit (TRU) uncovered a sophisticated malware campaign leveraging KoiLoader, a malicious loader designed to…
APT34, also known as OilRig or Helix Kitten, has intensified its cyber-espionage campaigns, deploying custom malware to target entities within…
A critical vulnerability has been identified in the Plantronics Hub software, a client application commonly used to configure Plantronics audio…