A new campaign distributing the Stealit infostealer employs previously unknown malware delivery techniques and infrastructure ...
A new malicious campaign is targeting macOS developers with fake Homebrew, LogMeIn, and TradingView platforms that deliver ...
Cybercriminals exploit Microsoft Teams through impersonation, malicious links and fake profiles to gather intel and deliver ...
The North Korean threat actor linked to the Contagious Interview campaign has been observed merging some of the functionality ...
There isn’t a consistent threat model for extension marketplaces yet, McCarthy said, making it difficult for any platform to ...
PDFs are the second most common file type used to deliver malware. Because they’re trusted for invoices, policies, and ...
Third-party security breach at Discord exposes sensitive user information including government IDs, highlighting ...
Porn users have been warned as a type of malware may be secretly filming them. Yep, there’s apparently been an increase in ...
Google reports North Korean hackers using EtherHiding to embed adaptive malware in blockchain smart contracts.
Fast-forward to 2019. Under President Donald Trump, the US escalated its "maximum pressure" campaign. Crippling sanctions ...
Microsoft has disrupted a wave of Rhysida ransomware attacks in early October by revoking over 200 certificates used to sign ...
The most notable cybersecurity risk associated with BYOD is data leakage. “Personal devices can easily leak sensitive data through unsecured apps, cloud storage or public Wi-Fi,” she explains.