Hiding in Plain Sight with App Domain Manager Injection
A little-known feature of the .NET framework allows attackers to execute malicious code inside trusted, Microsoft-signed applications without exploiting a software flaw or dropping a…
A little-known feature of the .NET framework allows attackers to execute malicious code inside trusted, Microsoft-signed applications without exploiting a software flaw or dropping a…
In this special edition of CyberWire Daily’s 10th anniversary series, N2K CyberWire’s Maria Varmazis and Dave Bittner discuss the biggest breaches over the past 10…
The Coruna exploit kit is an evolution of the framework used in the Operation Triangulation espionage campaign, which in 2023 targeted iPhones via zero-click iMessage…
Cybersecurity researchers are sounding the alarm over imminent in-the-wild exploitation of a recently disclosed critical vulnerability in Citrix NetScaler ADC and Gateway appliances. Threat intelligence…
Ravie LakshmananMar 27, 2026Threat Intelligence / Vulnerability A pro-Ukrainian group called Bearlyfy has been attributed to more than 70 cyber attacks targeting Russian companies since…
As they fled an Iranian missile strike, some Israelis with Android phones received a text offering a link to real-time information about bomb shelters. But…
Within the world of recruiting, more specifically the tech and remote-work world, the conversation about AI in hiring has moved past “if” to “how often.”…
Modern fraud attacks look like a relay race where different tools and actors handle each stage of the journey from signup to cash-out. When you…
A highly coordinated cyberespionage campaign has been uncovered targeting a government organization in Southeast Asia, with threat actors deploying a mix of USB-propagated malware, remote…
Red Hat has issued an urgent security alert regarding a highly sophisticated supply chain attack targeting the popular xz compression utility. Cybersecurity researchers discovered malicious code embedded…
Ravie LakshmananMar 27, 2026Ransomware / Malware Threat actors are using adversary-in-the-middle (AitM) phishing pages to seize control of TikTok for Business accounts in a new…
Apple issues urgent lock screen warnings for unpatched iPhones and iPads Pierluigi Paganini March 29, 2026 Apple is alerting users of outdated iPhones and iPads…