Russia, China & Iran Likely To Continue Influence Operations
As the United States transitions from the 2024 election cycle, cyber threat actors from Russia, China, and Iran are poised to intensify influence operations aimed…
As the United States transitions from the 2024 election cycle, cyber threat actors from Russia, China, and Iran are poised to intensify influence operations aimed…
The U.S. Department of Justice has unsealed the indictment against two suspected Snowflake hackers, who breached more than 165 organizations using the services of the…
The group, which has a mixture of hardware and software skills and first detailed their hack as part of a technology collective called Lagrange Point,…
To make data archives that last is an urgent task. That’s the message of the European Commission’s eArchiving initiative, which has just announced version 2.0…
Google is adding a new AI-powered scam protection feature that monitors phone call conversations on Google Pixel devices to detect patterns that warn when the…
As the UK’s Online Safety Act (OSA) approaches its first birthday, parents and teachers insist more must be done to protect young people and children…
Lawyers representing a former boxer charged with serious drug trafficking offences are challenging the legality of the US government’s use of intercepted messages obtained by…
Nov 13, 2024Ravie LakshmananThreat Intelligence / Cyber Espionage A threat actor affiliated with Hamas has expanded its malicious cyber operations beyond espionage to carry out…
The Chinese state threat actor most famously known as Volt Typhoon is staging a significant comeback after its botnet infrastructure was disrupted in a US-led…
Zoom addressed two high-severity issues in its platform Pierluigi Paganini November 13, 2024 Zoom addressed six flaws, including two high-severity issues that could allow remote…
Editor’s note: I’m thrilled to share a new guest post by my friend Laksh Raghavan. I’ve known Laksh for years, and he has great insights…
Let’s be honest—nobody likes thinking about worst-case scenarios. But in today’s digital terrain, cyberattacks are less of an “if” and more of a “when.” The…