Hackers pose as employers to steal crypto, login credentials
Since early 2024, ESET researchers have been tracking DeceptiveDevelopment, a series of malicious campaigns linked to North Korea-aligned operators. Disguising...
Read more →Since early 2024, ESET researchers have been tracking DeceptiveDevelopment, a series of malicious campaigns linked to North Korea-aligned operators. Disguising...
Read more →For decades, Microsoft Exchange has been the backbone of business communications, powering emailing, scheduling and collaboration for organizations worldwide. Whether...
Read more →Raymond Limited, a leading textile and apparel conglomerate, has confirmed a Raymond cyberattack that impacted parts of its IT infrastructure....
Read more →Norton is setting the standard for scam protection with a new range of AI-powered features fully integrated in Norton Cyber...
Read more →Privacera announced significant updates to its AI Governance (PAIG) platform, reinforcing its commitment to AI risk management and compliance. These...
Read more →A previously undocumented ransomware payload named NailaoLocker has been spotted in attacks targeting European healthcare organizations between June and October 2024....
Read more →1Password introduced 1Password Enterprise Password Manager – MSP Edition, a dedicated solution that transforms how MSPs safeguard client data and...
Read more →Russian state-sponsored hackers are ramping up efforts to compromise Signal messenger accounts, particularly those used by Ukrainian military personnel, government...
Read more →Symantec, a division of Broadcom, has released a critical security update to address a high-severity vulnerability identified in its Symantec...
Read more →Palo Alto Networks warns that CVE-2025-0111 flaw is actively exploited in attacks Pierluigi Paganini February 20, 2025 Palo Alto Networks...
Read more →The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued a joint advisory warning...
Read more →A Ghost ransomware group also referred to as Cring, has been actively exploiting vulnerabilities in software and firmware as recently...
Read more →