FBI Warns of Salesforce attacks by UNC6040 and UNC6395
FBI warns of Salesforce attacks by UNC6040 and UNC6395 groups Pierluigi Paganini September 13, 2025 The U.S. FBI issued a flash alert to warn of…
FBI warns of Salesforce attacks by UNC6040 and UNC6395 groups Pierluigi Paganini September 13, 2025 The U.S. FBI issued a flash alert to warn of…
IBM X-Force researchers have uncovered sophisticated new malware campaigns orchestrated by the China-aligned threat actor Hive0154, also known as Mustang Panda. The discovery includes an…
Hackers leaked 600 GB of data linked to the Great Firewall of China, exposing documents, code, and operations. Full details available on the GFW Report.…
Security researchers at Straiker’s AI Research (STAR) team have uncovered Villager, an AI-native penetration testing framework developed by Chinese-based group Cyberspike that has already accumulated…
In early September, Qrator Labs detected and mitigated one of the most significant L7 DDoS attacks seen this year, carried out by what is now…
Now more than ever before, our healthcare data is under attack. Of all of the sensitive information available on the dark web, medical records are…
The OWASP MAS project continues to lead the way in mobile application security. This article describes the resources and tools which have recently been added…
HybridPetya ransomware bypasses UEFI Secure Boot echoing Petya/NotPetya Pierluigi Paganini September 13, 2025 HybridPetya ransomware bypasses UEFI Secure Boot to infect EFI partitions, echoing the…
Okta Threat Intelligence exposes VoidProxy, a new PhaaS platform. Learn how this advanced service uses the Adversary-in-the-Middle technique to bypass MFA and how to protect…
The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert to release indicators of compromise (IoCs) associated with two cybercriminal groups tracked as…
A sophisticated malvertising campaign has emerged, exploiting GitHub repositories through dangling commits to distribute malware via fake GitHub Desktop clients. This novel attack vector represents…
A sophisticated malware campaign has emerged that leverages artificial intelligence to create deceptively legitimate applications, marking a significant evolution in cyberthreat tactics. The EvilAI malware…