A new cyber-attack has been observed exploiting Google Find Hub to remotely wipe Android devices, linked to North Korean APTs ...
Qilin group ransomware incidents have surged in SMBs, exploiting security gaps and collaborating with Scattered Spider threat ...
AI-powered coding opens doors for innovation but also for exploitation, as cyber risks rise with the rise of 'vibe coding' ...
Threat actors were exploiting vulnerable versions of Triofox after a patched version was released, said Google Cloud ...
CISA has demanded federal agencies patch a zero-day vulnerability affecting Samsung devices used in LandFall spyware attacks ...
“Quantum Route Redirect is an advanced automation platform that streamlines the entire phishing campaign process, from ...
A new study has revealed that nearly two-thirds of leading private AI companies have leaked sensitive information on GitHub.
Volexity has linked spear phishing operations to China-aligned UTA0388 in new campaigns using advanced tactics and LLMs ...
CISO Ensar Seker shares key lessons from negotiating 40+ ransomware cases across 15 countries and what every leader must know ...
The NCA’s new “Crypto Dream Scam Nightmare” campaign is being delivered through the Home Office’s Stop! Think Fraud ...
The UK’s National Cyber Security Centre has urged users of its Web Check and Mail Check services to find alternatives ...
Sandworm deployed data wipers against Ukrainian governmental entities and companies in the energy, logistics and grain ...