Check Point has identified a dozen attacks in September that bore the LockBit stamp, with half of them attributed to the ...
The activity, attributed by ESET to the North Korea-aligned Lazarus Group, marks the latest phase of Operation DreamJob, a ...
A cyber-espionage campaign by Pakistan’s TransparentTribe has been identified, targeting Indian government systems using ...
ToolShell exploit activity surged last quarter, appearing in over 60% of Cisco Talos IR cases and driving a sharp rise in ...
The operation uses verified Google Ads, fake news websites and deepfake videos to lure victims into a fraudulent investment ...
EDR tools are falling short as threats evolve. Explore how fast-moving adversaries are exploiting defender tools, creating a ...
Researchers at Forescout’s Vedere Labs have discovered two new vulnerabilities in TP-Link ’s Omada and Festa VPN routers that ...
AI-driven social engineering is set to be one of the most significant cyber threats in 2026, a new ISACA report revealed. The ...
Microsoft has revoked over 200 fraudulent code-signing certificates used in a ransomware campaign involving fake Teams ...
A spear phishing campaign dubbed PhantomCaptcha targeted Ukraine’s war relief efforts and regional government administrations ...
The Dutch Data Protection Authority issued Experian a €2.7m for GDPR violations including excessive collection of personal ...
The Coldriver hacking group reportedly shifted its operation quickly after the May 2025 public disclosure of its LostKeys ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results