Microsoft and Google expose China-based cyber threats Storm-2077 and GLASSBRIDGE, targeting U.S. agencies and amplifying ...
The North Korea-linked threat actor known as Sapphire Sleet is estimated to have stolen more than $10 million worth of ...
APT-K-47, aka Mysterious Elephant, exploits Hajj themes and Asyncshell malware in Pakistan-targeted cyberattacks.
TAG-110's use of HATVIBE and CHERRYSPY was first documented by CERT-UA back in late May 2023 in connection with a cyber ...
A China-linked nation-state group called TAG-112 compromised Tibetan media and university websites in a new cyber espionage ...
Palo Alto Networks, which is tracking the initial zero-day exploitation of the flaws under the name Operation Lunar Peek, ...
The China-aligned advanced persistent threat (APT) actor known as Gelsemium has been observed using a new Linux backdoor ...
Learn why Automated Security Validation is critical for cybersecurity, addressing false positives and hidden threats.
North Korea exploits fake IT firms and workers globally to fund weapons programs, evade sanctions, and conduct cyberattacks.
Reduce cybersecurity risks and streamline compliance with PAM solutions. Discover 10 ways PAM enhances your security.
Google’s AI tool OSS-Fuzz uncovers 26 vulnerabilities, including a decades-old OpenSSL flaw, boosting open-source security.
Cybersecurity researchers have discovered two malicious packages uploaded to the Python Package Index (PyPI) repository that impersonated popular artificial intelligence (AI) models like OpenAI ...