admin
September 26, 2023
A "multi-year" Chinese state-sponsored cyber espionage campaign has been observed targeting South Korean academic, political, and government...
admin
September 25, 2023
Ukrainian military entities are the target of a phishing campaign that leverages drone manuals as lures to...
admin
September 25, 2023
Generative AI is a double-edged sword, if there ever was one. There is broad agreement that tools...
admin
September 25, 2023
Weak password policies leave organizations vulnerable to attacks. But are the standard password complexity requirements enough to...
admin
September 25, 2023
Tibetan, Uyghur, and Taiwanese individuals and organizations are the targets of a persistent campaign orchestrated by a...
New Report Uncovers 3 Distinct Clusters of China-Nexus Attacks on Southeast Asian Government

4 min read
admin
September 25, 2023
An unnamed Southeast Asian government has been targeted by multiple China-nexus threat actors as part of espionage...
admin
September 23, 2023
Cybersecurity researchers have discovered a previously undocumented advanced backdoor dubbed Deadglyph employed by a threat actor known as Stealth...
admin
September 23, 2023
The three zero-day flaws addressed by Apple on September 21, 2023, were leveraged as part of an iPhone exploit...
admin
September 22, 2023
An active malware campaign targeting Latin America is dispensing a new variant of a banking trojan called BBTok,...
admin
September 22, 2023
Thorough, independent tests are a vital resource for analyzing provider’s capabilities to guard against increasingly sophisticated threats...
admin
September 22, 2023
Israeli organizations were targeted as part of two different campaigns orchestrated by the Iranian nation-state actor known...
admin
September 22, 2023
Atlassian and the Internet Systems Consortium (ISC) have disclosed several security flaws impacting their products that could...
admin
September 22, 2023
Apple has released yet another round of security patches to address three actively exploited zero-day flaws impacting...
admin
September 21, 2023
A previously undocumented threat actor dubbed Sandman has been attributed to a set of cyber attacks targeting telecommunic koation...
admin
September 21, 2023
The peer-to-peer (P2) worm known as P2PInfect has witnessed a surge in activity since late August 2023, witnessing a...
admin
September 21, 2023
A malicious actor released a fake proof-of-concept (PoC) exploit for a recently disclosed WinRAR vulnerability on GitHub...
admin
September 21, 2023
Security teams are familiar with threats emanating from third-party applications that employees add to improve their productivity....
admin
September 21, 2023
China's Ministry of State Security (MSS) has accused the U.S. of breaking into Huawei's servers, stealing critical...
admin
September 21, 2023
A financially motivated threat actor has been outed as an initial access broker (IAB) that sells access...
admin
September 21, 2023
The maintainers of Free Download Manager (FDM) have acknowledged a security incident dating back to 2020 that...