New Infostealer Campaign Targets Popular Games
Cyble threat intelligence researchers have uncovered an infostealer campaign that spreads the Maranhão Stealer through social engineering websites claiming to...
Read more →Cyble threat intelligence researchers have uncovered an infostealer campaign that spreads the Maranhão Stealer through social engineering websites claiming to...
Read more →China is ramping up its cybersecurity enforcement with new regulations requiring network operators to report severe cybersecurity incidents within one...
Read more →A severe security vulnerability has been discovered in FlowiseAI, an open-source AI workflow automation tool, exposing users to the risk...
Read more →The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a manufacturing operations management software vulnerability to its Known Exploited...
Read more →Cybercrime and online scams have officially overtaken traditional threats as the primary regional security concern for the Association of Southeast...
Read more →The U.S. Federal Trade Commission has opened a formal inquiry into AI chatbots that act like companions—designed to mimic emotions,...
Read more →Over half of insider cyber incidents in UK schools are being caused by students—a trend raising alarms across education, regulation,...
Read more →A massive NPM supply chain attack that hit about 10% of all cloud environments yielded little for the hackers who...
Read more →SAP has released a new security update addressing a broad range of vulnerabilities across its product ecosystem. Among the most...
Read more →A fresh firestorm has erupted over Microsoft’s handling of cybersecurity risks, with U.S. Senator Ron Wyden (D-OR) calling on the...
Read more →The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has issued an urgent alert regarding active exploitation of a...
Read more →The U.S. Department of Justice has unsealed charges against Ukrainian national for administering the LockerGoga, MegaCortex, and Nefilim ransomware operations,...
Read more →