Threat intelligence observations show that a single threat actor is responsible for most of the active exploitation of two ...
This week, Italy blocked Russian cyberattacks targeting the Olympics. Flaws in SolarWinds, Ivanti and Microsoft Office.
China-linked Amaranth-Dragon and Mustang Panda target Southeast Asian governments using WinRAR exploit and PlugX phishing ...
Image courtesy by QUE.com In the wake of a major communications disruption in Iran, threat researchers have observed the Infy ...
Security researchers detected artificial intelligence-generated malware exploiting the React2Shell vulnerability, allowing ...
From perfectly spelled phishing emails to fake videos of government officials, artificial intelligence is changing the game ...
The widely used, open source text-editing software Notepad++ for Windows said attackers exploited a vulnerability to redirect ...
A hacker noticed the change in its status and hijacked the dead add-in and its 4.71-star rating to conduct a phishing campaign that the company which uncovered the attack, plug-in security company Koi ...
A new state-aligned cyberespionage threat group tracked as TGR-STA-1030/UNC6619, has conducted a global-scale operation ...
At Interpol's multi-pronged cybercrime facility in Singapore, specialists pore through vast amounts of data in a bid to prevent the next big ransomware attack or impersonation scam.
From perfectly spelled phishing e-mails to fake videos of government officials, artificial intelligence (AI) is changing the game for Interpol’s cat-and-mouse fight against cybercrime at its high-tech ...