Attackers Utilising Weaponized MS Office Doc
Researchers from Perception Point identified a new malware campaign, PhantomBlu, targeting US organizations that use novel techniques to deploy NetSupport RAT, a remote access trojan,…
Researchers from Perception Point identified a new malware campaign, PhantomBlu, targeting US organizations that use novel techniques to deploy NetSupport RAT, a remote access trojan,…
The notorious ransomware group known as TOXINBIO has intensified its recruitment efforts following a significant disruption by international law enforcement agencies. This development comes in…
Flipper Devices Inc., the company behind the multifunctional Flipper Zero tool, has formally responded to the Canadian government’s decision to ban the device. The Canadian…
The Chrome team has proudly announced that Chrome 123 has been promoted to the stable channel for users on Windows, Mac, and Linux. This latest…
Researchers investigated potential malicious uses of AI by threat actors and experimented with various AI models, including large language models, multimodal image models, and text-to-speech…
VMware has completed its first 100 days under Broadcom’s wing, beginning a transformative journey toward becoming the world’s leading infrastructure technology company. This period has…
A coalition of democratic nations has come together to address the growing threat posed by the misuse of commercial spyware. The United States and 17…
Cybersecurity and Infrastructure Security Agency (CISA), along with the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), and international partners, have issued a…
Threat actors use SVG files in cyber-attacks because SVGs (Scalable Vector Graphic files) can contain embedded scripts, making them a vector for executing malicious code. …
In a groundbreaking report released by Microsoft, in collaboration with Dr. Chris Brauer of Goldsmiths, University of London, an alarming 87% of UK organizations have…
The Department of Defense (DoD) Cyber Crime Center (DC3) recently announced a significant milestone in its cybersecurity efforts. The processing of over 50,000 vulnerability reports…
Hackers use stealers to gather sensitive information, for example, login credentials, financial data, or personal details from victims’ devices. These stolen credentials can be employed…