RansomHub using FakeUpdates scheme to attack government sector
RansomHub cyber threat actors have found a new way to deploy their ransomware, and they’re using it to target U.S. government...
Read more →RansomHub cyber threat actors have found a new way to deploy their ransomware, and they’re using it to target U.S. government...
Read more →A sophisticated malware campaign dubbed “DocSwap” has emerged targeting Android users globally by disguising itself as a legitimate document security...
Read more →The Bybit hack, which occurred on February 21, 2025, has been extensively analyzed by multiple cybersecurity teams, including Sygnia. This...
Read more →Mar 18, 2025Ravie LakshmananVulnerability / Windows Security An unpatched security flaw impacting Microsoft Windows has been exploited by 11 state-sponsored...
Read more →Google announced Tuesday it will acquire cloud security firm Wiz for $32 billion. The move pairs Google — among the...
Read more →Blockchain gaming platform WEMIX suffered a cyberattack last month, allowing threat actors to steal 8,654,860 WEMIX tokens, valued at approximately...
Read more →Microsoft has issued an urgent security advisory regarding a newly discovered malware strain called StilachiRAT, which specifically targets and exfiltrates...
Read more →Applications developed by citizen developers are on the rise. Low-code and no-code (LCNC) platforms are reshaping the development ecosystem. These...
Read more →In a recent cybersecurity threat, hackers have been using virtual hard disk image files (.vhd) to distribute the VenomRAT malware,...
Read more →With Android devices deeply embedded in business operations, it’s no surprise that cybercriminals are increasingly targeting them. Businesses are now...
Read more →The contemporary SOC is transforming as it starts to realize the benefits of GenAI and utilize the manifestations of autonomous...
Read more →A sophisticated new phishing campaign has been discovered that exploits Microsoft 365’s legitimate infrastructure to conduct highly convincing credential harvesting...
Read more →