Mustang Panda Hits India and S. Korea with Updated LOTUSLITE Backdoor
A group of China-linked hackers known as Mustang Panda has expanded its spying efforts to target the Indian financial sector and political circles in South…
A group of China-linked hackers known as Mustang Panda has expanded its spying efforts to target the Indian financial sector and political circles in South…
The Mozilla Foundation tested Claude Mythos, an Anthropic AI model that has stirred debate in the cybersecurity community. Before granting access to Mythos, Mozilla scanned…
Cybersecurity researchers have flagged a fresh set of packages that have been compromised by bad actors to deliver a self-propagating worm that spreads through stolen…
Consumers are being urged to replace passwords with passkeys as a simpler, more secure method of accessing online services. The National Cyber Security Centre (NCSC),…
ANZ Banking Group’s chief information security officer of almost three years Dr Maria Milosavljevic has retired, with an interim security chief now in place. Milosavljevic…
A threat actor has used a new wiper malware in recent attacks against the energy and utilities sector, cybersecurity company Kaspersky warns. The attack targeted…
Mirai Botnet exploits CVE-2025-29635 to target legacy D-Link routers Pierluigi Paganini April 22, 2026 Mirai botnet is targeting old D-Link routers using CVE-2025-29635, a command…
CISA has been without a permanent director for more than a year, imperiling its efforts to establish a strategic direction. Source link
House Republicans unveiled on Wednesday Congress’ latest effort to tackle comprehensive digital privacy legislation for Americans. The Secure Data Act would allow consumers to opt…
The US visa system rolls out the “red carpet” for spies and aids China’s alleged efforts to steal American innovation, senators charged at a congressional…
HAT Distribution has signed an exclusive distribution partnership across Oceania with Tailscale, expanding availability of Tailscale’s secure connectivity platform to partners and customers across Australia,…
Identity-based attacks Attackers are increasingly impersonating legitimate users, machines, or services to gain access to systems, data, or infrastructure. The technique is on the upswing…