Infostealer Attacks Surge 84% Weekly Through Phishing Emails
The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week in 2024, according to the latest IBM X-Force report. This sharp…
The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week in 2024, according to the latest IBM X-Force report. This sharp…
Fake Booking.com emails trick hotel staff into running AsyncRAT malware via fake CAPTCHA, targeting systems with remote access trojan. A new phishing campaign is targeting…
November 12, 2012 I believe western civilization to be in the middle of a profound transition. The change I’m referring to is the move from…
In 2025, digital forensics stands at the intersection of rapid technological innovation, increasingly sophisticated cyber threats, and the ever-expanding volume of digital data. The role…
Cybersecurity experts have observed an alarming increase in the use of SVG (Scalable Vector Graphics) files for phishing attacks. These attacks leverage the versatility of…
Apr 21, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have flagged a new malicious campaign related to the North Korean state-sponsored threat actor known as Kimsuky…
Japan’s Financial Services Agency (FSA) warned last week of the growing threat of hacked trading accounts that has resulted in nearly US $700 million in…
I’ve been thinking a lot about content for the book I’m working on, and given that the theme is speaking clearly and honestly about topics…
Dive Brief: Security researchers on Monday warned of a critical vulnerability in the Erlang Open Telecom Platform SSH implementation, which could allow an unauthenticated attacker…
Two top officials at the Cybersecurity and Infrastructure Security Agency who worked with the private sector to manufacture secure products and technology are leaving the…
Microsoft confirms that the weekend Entra account lockouts were caused by the invalidation of short-lived user refresh tokens that were mistakenly logged into internal systems. On Saturday…
Cyber hygiene refers to the routine practices and fundamental security measures organizations implement to maintain system health and improve security posture. In today’s rapidly evolving…