Two Estonian nationals are facing up to 20 years behind bars after pleading guilty to running a huge cryptocurrency fraud ...
“An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access ...
A Golang backdoor is using Telegram as its command and control (C2) channel, an approach that makes detection harder for defenders, according to Netskope researchers ...
Volexity highlighted how Russian nation-state actors are stealing Microsoft device authentication codes to compromise ...
Astaroth is an advanced phishing kit using real-time credential and session cookie capture to compromise Gmail, Yahoo and ...
Symantec found that tools previously only used by Chinese nation-state espionage actors were deployed in a ransomware attack ...
The organization becomes the AI Security Institute as the UK shifts its focus to tackling AI risks to national security ...
Travelers' Jaime Palumbo discusses the third-party cyber risk landscape, and actions organizations need to take to address ...
SecurityScorecard has uncovered a sophisticated campaign linked to North Korea’s Lazarus Group, distributing crypto-stealing ...
NCSC CTO Ollie Whitehouse discussed a UK government-backed project designed to secure underlying computer hardware, ...
Ahead of Valentine’s Day, Chainalysis figures reveal 40% increase in losses to pig butchering, or romance baiting, scams ...
Gcore reported a 56% year-over-year rise in DDoS attacks in H2 2024, highlighting a steep long-term growth tend for the ...