Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal Messages
Mar 20, 2025Ravie LakshmananCybercrime / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of a new campaign...
Read more →Mar 20, 2025Ravie LakshmananCybercrime / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) is warning of a new campaign...
Read more →A sophisticated attack vector dubbed “MalDoc in PDF” allows threat actors to bypass traditional security scanning by embedding malicious Word...
Read more →SpyX, a company known for developing spyware, has experienced a data breach that compromised the personal information of nearly 2...
Read more →Long-lived plaintext credentials have been involved in most breaches over the last several years, according to GitGuardian. When valid credentials,...
Read more →Password reuse continues to be one of the most significant security vulnerabilities in 2025, with alarming new data showing nearly...
Read more →A recently discovered vulnerability in the Linux kernel, identified as CVE-2025-0927, poses a significant threat to system security. This flaw,...
Read more →In this Help Net Security interview, Sunil Seshadri, EVP and CSO at HealthEquity, talks about the growing risks to healthcare...
Read more →California Cryobank LLC, one of America’s largest sperm donor repositories, has confirmed a significant data breach that exposed sensitive customer...
Read more →Despite growing national security concerns and government restrictions, Chinese military-linked companies remain deeply embedded in the US digital supply chain,...
Read more →A sophisticated attack employing Legacy Driver Exploitation technique has emerged as a significant cybersecurity threat, according to a recent security...
Read more →ANY.RUN, the interactive malware analysis platform has announced full support for Android OS in its cloud-based sandbox environment, enabling security...
Read more →Cybersecurity experts have identified a persistent trend of threat actors exploiting legitimate remote monitoring and management (RMM) software to infiltrate...
Read more →