Researchers Uncover Malware Using BYOVD to Bypass Antivirus Protections
Nov 25, 2024Ravie LakshmananMalware / Windows Security Cybersecurity researchers have uncovered a new malicious campaign that leverages a technique called...
Read more →Nov 25, 2024Ravie LakshmananMalware / Windows Security Cybersecurity researchers have uncovered a new malicious campaign that leverages a technique called...
Read more →Nov 23, 2024Ravie LakshmananArtificial Intelligence / Cryptocurrency The North Korea-linked threat actor known as Sapphire Sleet is estimated to have...
Read more →Nov 23, 2024Ravie LakshmananCloud Security / Threat Intelligence Government agencies and non-governmental organizations in the United States have become the...
Read more →Nov 22, 2024Ravie LakshmananCyber Espionage / Malware A China-linked nation-state group called TAG-112 compromised Tibetan media and university websites in...
Read more →Nov 22, 2024Ravie LakshmananCyber Attack / Malware The threat actor known as Mysterious Elephant has been observed using an advanced...
Read more →Google Workspace has quickly become the productivity backbone for businesses worldwide, offering an all-in-one suite with email, cloud storage and...
Read more →Nov 22, 2024Ravie LakshmananCyber Espionage / Malware Threat actors with ties to Russia have been linked to a cyber espionage...
Read more →Meta Platforms, Microsoft, and the U.S. Department of Justice (DoJ) have announced independent actions to tackle cybercrime and disrupt services...
Read more →Nov 22, 2024Ravie LakshmananArtificial Intelligence / Malware Cybersecurity researchers have discovered two malicious packages uploaded to the Python Package Index...
Read more →Nov 21, 2024Ravie LakshmananCyber Espionage / Malware The China-aligned advanced persistent threat (APT) actor known as Gelsemium has been observed...
Read more →Nov 21, 2024Ravie LakshmananVulnerability / Cyber Attack As many as 2,000 Palo Alto Networks devices are estimated to have been...
Read more →Privileged access management (PAM) plays a pivotal role in building a strong security strategy. PAM empowers you to significantly reduce...
Read more →