The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week in 2024, according to the latest…
A division of Palo Alto Networks, have revealed a sophisticated scheme by North Korean IT workers to infiltrate organizations globally…
Cybersecurity experts have observed an alarming increase in the use of SVG (Scalable Vector Graphics) files for phishing attacks. These…
DNS tunneling is a covert technique that cybercriminals use to bypass traditional network security measures and exfiltrate data or establish…
The Akira ransomware group has intensified its operations, targeting over 350 organizations and claiming approximately $42 million USD in ransom…
Recent research has unveiled a concerning vulnerability within the realm of containerized applications, where threat actors are leveraging stolen certificates…
Cybersecurity researchers at Guardio Labs have unveiled a troubling new trend dubbed "VibeScamming," where cybercriminals are using AI tools to…
In an era where cybersecurity has become paramount, the banking and financial sectors are facing an alarming escalation in ransomware…
A new variant of the FOG ransomware has been identified, with attackers exploiting the name of the Department of Government…
Security researchers have linked the notorious RedGolf hacking group to a wave of exploits targeting Fortinet firewall zero-days and the…