In an alarming development, Denmark faced its most extensive cyber attack in May 2023, targeting crucial components of its energy…
Dark forums and Telegram channels have become great places for threat actors to sell critical vulnerabilities and exploits. These vulnerabilities…
As we rely on the Internet for communication, business transactions, and various aspects of our daily lives, the need for…
Researchers detected IMPERIAL KITTEN, an adversary with ties to Iran, conducting strategic web compromise (SWC) operations with a focus on…
Cybersecurity researchers link attackers to the Iranian-backed APT group "Agonizing Serpens," which has upgraded its capabilities and uses various tools…
Two critical OS command injection flaws have been discovered in multiple QNAP products, which include QTS, Multimedia Console, Media Streaming…
A new wave of cyberattacks has been discovered by Netskope Threat Labs, involving the use of SharePoint as a delivery…
Bank robbers of today are nothing like their counterparts of the past. Modern-day Bonnie and Clyde operate remotely, carrying out…
Cybercriminals are resorting to unscrupulous tactics to deploy Bonanza malware by exploiting Google Search Ads. The hackers are taking advantage…
LinkedIn messages were used as a way to launch identity theft attacks in a malicious campaign that Cluster25 detected. They…