Threat actors have been observed hosting phishing documents on legitimate digital document publishing (DDP) sites as part of continuous session…
A federal jury in Washington, D.C., has convicted Roman Sterlingov, a dual Russian-Swedish national, for operating the notorious darknet cryptocurrency…
The "State of the UAE—Cybersecurity Report 2024," a collaborative effort by the UAE Cyber Security Council and CPX Holding, has…
The Stanford University data breach involved a ransomware attack by the Akira ransomware gang. The breach occurred between May 12,…
In the wake of the LockBit ransomware group's takedown, a shift has occurred within the cybercriminal underworld, leading to a…
The Andariel threat group was observed conducting persistent attacks against domestic businesses, specifically installing MeshAgent for remote screen control while…
There are advantages to using standalone AI chatbots over cloud-based alternatives such as OpenAI; however, there are also some security…
Threat actors use pentesting tools to identify vulnerabilities and weaknesses in target systems or networks. These tools provide a simulated…
Over 200,000 websites have been left vulnerable to Cross-Site Scripting (XSS) attacks due to a flaw in the Ultimate Member…
BianLian attackers exploited a TeamCity vulnerability (CVE-2024-27198 or CVE-2023-42793) to gain initial access and move laterally within the network. They…