Quad Talks Enhance Maritime Security And Cyber Defense
In a key step to improve maritime safety in the Asia-Pacific region, top diplomats from Japan, the United States, Australia, and India met in Tokyo…
In a key step to improve maritime safety in the Asia-Pacific region, top diplomats from Japan, the United States, Australia, and India met in Tokyo…
Void Banshee, a threat actor, has been exploiting a critical MSHTML vulnerability, CVE-2024-38112, to distribute the Atlantida InfoStealer malware. This sophisticated campaign has targeted unsuspecting…
A malicious campaign emerged on June 21, 2024, distributing a JavaScript file hosted on grupotefex.com, which executes an MSI installer, subsequently dropping a Brute Ratel…
More organizations rely on cloud platforms to reap the benefits of scalability, flexibility, availability, and reduced costs. However, cloud environments come with security challenges and…
Hackers continuously exploit malicious Python packages to attack developer environments and inject harmful code that enables them to steal sensitive information, install malware, or create…
There has been an uptick in phishing campaigns leveraging Microsoft Forms this month, aiming to trick targets into sharing their Microsoft 365 login credentials. A…
Hackers often attack secure boot during the boot process to execute unauthorized code, which gives them the ability to bypass a system’s security measures. By…
South Korea has recently disclosed a data breach involving its Korea Defense Intelligence Command (KDIC), a critical arm of the nation’s military intelligence apparatus. The…
A threat actor known as Stargazer Goblin has set up a network of inauthentic GitHub accounts to fuel a Distribution-as-a-Service (DaaS) that propagates a variety…
TechCrunch has learned that Spytech, a little-known spyware maker based in Minnesota, has been hacked, exposing sensitive data from thousands of devices worldwide. The breach…
The French government has investigated a malware attack that compromised approximately 3,000 machines within the country. The attack, part of a more extensive botnet operation…
The way organisations store, manage and analyse data will always be a challenging issue given the constant assault of data on corporate IT systems. It’s…