Cyber Attack
Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis
A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as "Cascading Shadows" to deliver various malware, including Agent Tesla, XLoader,...
cyber security
Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024
The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in the number of vulnerabilities detected within Microsoft's ecosystem, setting a...
Android
43% of Top 100 Enterprise Mobile Apps Expose Sensitive Data to Hackers
A comprehensive study by zLabs, the research team at Zimperium, has found that over 43% of the top 100 mobile applications used in business...
cyber security
LummaStealer Exploits Windows Utility to Run Remote Code Disguised as .mp4 File
The Cybereason Global Security Operations Center (GSOC) has shed light on the sophisticated tactics used by the LummaStealer malware to evade detection and execute...
cyber security
The Future of Cybersecurity Talent – Trends and Opportunities
The cybersecurity landscape is transforming rapidly, driven by evolving threats, technological advancements, and a persistent global talent shortage.
By 2025, the sector faces a shortfall...
cyber security
Mobile Security – Emerging Risks in the BYOD Era
The rise of Bring Your Own Device (BYOD) policies has revolutionized workplace flexibility, enabling employees to use personal smartphones, tablets, and laptops for professional...
Cyber Attack
China Plans Expanded Cybersecurity Cooperation with Russia
China has announced a significant step forward in its partnership with Russia, with plans to expand their cooperation in the field of cybersecurity.
In an...
cyber security
Ghost Ransomware Targets Organizations Across 70+ Countries
A new ransomware variant known as "Ghost" (also referred to as Cring) has emerged as a significant danger.
Since its first appearance in 2021, the...