Fake Tax Audits and Updates Fuel Silver Fox Malware Campaign
A China-linked threat group known as Silver Fox is running a new wave of cyber campaigns using fake tax audit notifications and software update lures…
A China-linked threat group known as Silver Fox is running a new wave of cyber campaigns using fake tax audit notifications and software update lures…
When people think about cybersecurity mistakes, they usually think about the obvious ones. Phishing emails, weak passwords, malicious attachments, a malicious browser extension, or a…
International espionage isn’t always about sophisticated malware and zero-day bugs. Sometimes it’s as simple as pretending to be someone else asking for a favor. For…
When patching isn’t fast enough, NDR helps contain the next era of threats. If you’ve been tracking advancements in AI, you know the exploit window,…
Lloyds Banking Group has paid compensation to 1,625 more customers after personal data was exposed in an incident described by the Treasury Committee chair as…
Medtronic, the global leader in medical technology, disclosed a data breach affecting its corporate IT systems. On April 24, the company confirmed that an unauthorized third party…
A cybersecurity incident has raised concerns after it was revealed that sensitive data associated with the Jurong Region Line (JRL) MRT stations and the Changi…
A Chinese national accused of directing attacks as part of the large scale Hafnium intrusion campaign has appeared in court in the United States after being…
Threat detection startup Spectrum Security has emerged from stealth mode with $19 million in seed funding. The investment round was led by TechOperators, with additional…
New Android spyware Morpheus linked to Italian surveillance firm Pierluigi Paganini April 28, 2026 Osservatorio Nessuno uncovered Morpheus spyware spreading via fake Android apps to…
U.S. states issued $3.45 billion in privacy-related fines to companies in 2025, a total larger than the last five years combined, according to research and…
EDR-Software verhindert Endpunkt-Sicherheitsdebakel. Die richtige Lösung vorausgesetzt. SvetaZi | shutterstock.com Software im Bereich Endpoint Detection and Response (EDR) erfreut sich weiterhin steigender Beliebtheit – und…