China-Linked Hackers Hit Qatar with Backdoor Disguised as War News
Check Point Research reveals that China-linked hackers, including the Camaro Dragon group, are targeting Qatar with malware disguised as Middle East conflict news. Using tools…
Check Point Research reveals that China-linked hackers, including the Camaro Dragon group, are targeting Qatar with malware disguised as Middle East conflict news. Using tools…
Ravie LakshmananMar 10, 2026Network Security / Vulnerability Cybersecurity researchers are calling attention to a new campaign where threat actors are abusing FortiGate Next-Generation Firewall (NGFW)…
I think I just figured out why things might be so bad in the United States and maybe elsewhere as well. And it really runs…
What is purple teaming? Purple teaming is often described as the collaboration between red teams and blue teams. That definition is accurate, but incomplete. At…
November 2025 saw a significant 69% decrease in high-impact vulnerabilities, with Recorded Future’s Insikt Group® identifying 10 vulnerabilities requiring immediate attention, down from 32 in…
When a ransomware attack occurs, the focus is most often on the encryption of files. Initial access is often glossed over or simply assumed. In…
By Sila Ozeren Hacioglu, Security Research Engineer at Picus Security. Splashy breaches are out. Attackers are increasingly abandoning loud, disruptive attacks in favor of long-term,…
OpenAI has announced the acquisition of Promptfoo, an artificial intelligence security platform designed to help enterprises identify and fix vulnerabilities in their AI systems during…
Phishers are targeting AWS accounts holders with fake email security alerts and redirecting them to a high-fidelity clone of the AWS Management Console sign-in page,…
Cybersecurity researchers have discovered a new malware called KadNap that’s primarily targeting Asus routers to enlist them into a botnet for proxying malicious traffic. The…
Ratings agencies warn that the U.S. and Israeli bombing campaign against Iran could raise the level of cyber risk for U.S. public finance issuers. Fitch…
Introduction The cybersecurity landscape is rapidly growing in scale and complexity. Enterprises face a rising tide of sophisticated threats that cannot be contained by traditional,…