Chinese hackers use custom malware to spy on US telecom networks
The Chinese state-sponsored Salt Typhoon hacking group uses a custom utility called JumbledPath to stealthily monitor network traffic and potentially...
Read more →The Chinese state-sponsored Salt Typhoon hacking group uses a custom utility called JumbledPath to stealthily monitor network traffic and potentially...
Read more →Artificial intelligence (AI) is the simulation of human intelligence in machines, enabling systems to learn from data, recognize patterns, and...
Read more →Microsoft has issued a security bulletin for a high-severity elevation of privilege vulnerability in Power Pages, which hackers exploited as...
Read more →The Darcula phishing-as-a-service (PhaaS) platform is preparing to release its third major version, with one of the highlighted features, the...
Read more →Microsoft is not testing a fix for a longstanding known issue that is breaking SSH connections on some Windows 11...
Read more →A previously undocumented ransomware payload named NailaoLocker has been spotted in attacks targeting European healthcare organizations between June and October 2024....
Read more →CISA and the FBI said attackers deploying Ghost ransomware have breached victims from multiple industry sectors across over 70 countries,...
Read more →A new JavaScript obfuscation method utilizing invisible Unicode characters to represent binary values is being actively abused in phishing attacks...
Read more →The FakeUpdate malware campaigns are increasingly becoming muddled, with two additional cybercrime groups tracked as TA2726 and TA2727, running campaigns...
Read more →Genea, one of Australia’s largest fertility services providers, disclosed that unknown attackers breached its network and accessed data stored on compromised...
Read more →WinRAR 7.10 was released yesterday with numerous features, such as larger memory pages, a dark mode, and the ability to...
Read more →For years, defensive security strategies have focused on three core areas: network, endpoint, and email. Meanwhile, the browser, where most...
Read more →