Innovator Spotlight: Traceable AI – Cyber Defense Magazine
Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several industry leaders who are paving…
Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several industry leaders who are paving…
Aug 29, 2024Ravie LakshmananCyber Espionage / Malware A non-profit supporting Vietnamese human rights has been the target of a multi-year campaign designed to deliver a…
Nominations are open for the 2024 Security Serious Unsung Heroes cyber security awards, recognising the exceptional talent in the UK security community, with veteran cyber…
Image: Midjourney The Corona Mirai-based malware botnet is spreading through a 5-year-old remote code execution (RCE) zero-day in AVTECH IP cameras, which have been discontinued…
A malicious AutoIT-compiled executable has been discovered that attempts to open Gmail login pages using popular browsers and possesses capabilities to steal clipboard data, capture…
A sophisticated VPN phishing and vishing campaign targeting over 130 US organizations uses social engineering tactics like phone calls and SMS messages to steal credentials.…
Check Point Software Technologies has officially announced its intention to acquire Cyberint, a pioneer in External Risk Management solutions; although the financial details of the…
Pavel Durov, the founder and chief executive of Telegram, has been placed under formal investigation by a French judge over allegations relating to criminal activity…
Ransomware-as-a-Service (RaaS) significantly lowers the technical barriers for threat actors to launch ransomware attacks, even it also enables threat actors with minimal skills to execute…
In recent years, elite commercial spyware vendors like Intellexa and NSO Group have developed an array of powerful hacking tools that exploit rare and unpatched…
As organizations increasingly rely on SaaS applications, the risk of data breaches and unauthorized access grows significantly. According to a 2024 study by the Ponemon…
Hackers sponsored by the Iranian government are acting as go-betweens and initial access brokers to target environments on behalf of financially motivated ransomware gangs, including…