In a new social media post published on February 17, Microsoft Threat Intelligence said it had detected a new variant of ...
Two Estonian nationals are facing up to 20 years behind bars after pleading guilty to running a huge cryptocurrency fraud ...
“An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access ...
A Golang backdoor is using Telegram as its command and control (C2) channel, an approach that makes detection harder for defenders, according to Netskope researchers ...
Volexity highlighted how Russian nation-state actors are stealing Microsoft device authentication codes to compromise ...
Symantec found that tools previously only used by Chinese nation-state espionage actors were deployed in a ransomware attack ...
The organization becomes the AI Security Institute as the UK shifts its focus to tackling AI risks to national security ...
SecurityScorecard has uncovered a sophisticated campaign linked to North Korea’s Lazarus Group, distributing crypto-stealing ...
NCSC CTO Ollie Whitehouse discussed a UK government-backed project designed to secure underlying computer hardware, ...
Travelers' Jaime Palumbo discusses the third-party cyber risk landscape, and actions organizations need to take to address ...
The Electronic Frontier Foundation has requested a US federal court to block Elon Musk’s DOGE access to US Office of ...
Ahead of Valentine’s Day, Chainalysis figures reveal 40% increase in losses to pig butchering, or romance baiting, scams ...