UAV and C-UAV Technologies as Targets
The Rise of Cyber Espionage: UAV and C-UAV Technologies as Targets Pierluigi Paganini February 13, 2025 Researchers at cybersecurity firm Resecurity detected a rise in…
The Rise of Cyber Espionage: UAV and C-UAV Technologies as Targets Pierluigi Paganini February 13, 2025 Researchers at cybersecurity firm Resecurity detected a rise in…
The Dutch Police (Politie) dismantled the ZServers/XHost bulletproof hosting operation after taking offline 127 servers used by the illegal platform. Earlier this week, the authorities in the…
An unprecedented letter from the US Congress, released today, accuses the UK of “a foreign cyberattack waged through political means”. The claim refers to a…
Over a hundred cyber security experts, companies and civil society groups have signed a letter calling for the Home Secretary, Yvette Cooper to drop demands…
Zacks Investment Research (Zacks) last year reportedly suffered another data breach that exposed sensitive information related to roughly 12 million accounts. Zacks is an American…
North Korean state-sponsored group Kimsuky (aka Emerald Sleet, aka VELVET CHOLLIMA) is attempting to deliver malware to South Korean targets by leveraging the so-called “ClickFix”…
Valentine’s Day 2025 is just around the corner, and many men are likely busy picking out thoughtful gifts to impress their loved ones—some of which…
Feb 13, 2025Ravie LakshmananWeb Security / Cloud Security A widespread phishing campaign has been observed leveraging bogus PDF documents hosted on the Webflow content delivery…
As the European Union (EU) prepares to respond to Trump’s 25% tariff on aluminium and steel, a widely reported paper from Goldman Sachs has suggested…
China-linked APTs’ tool employed in RA World Ransomware attack Pierluigi Paganini February 13, 2025 A November 2024 RA World ransomware attack on an Asian software…
Over half a billion websites are powered by WordPress as of today. Unfortunately, not every instance deserves the same security attention as the other. The…
A China-based threat actor, tracked as Emperor Dragonfly and commonly associated with cybercriminal endeavors, has been observed using in a ransomware attack a toolset previously attributed…