Look to the future: How the threat landscape may evolve next
It’s been quite the half-decade. In fact, it’s hard to know where to start when reflecting on it. The Covid-19...
Read more →It’s been quite the half-decade. In fact, it’s hard to know where to start when reflecting on it. The Covid-19...
Read more →INTERPOL is advocating for a shift in terminology to combat online relationships and investment fraud. The international police organization is...
Read more →The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing campaigns. Delivered as attachments disguised as...
Read more →In an era where we are completely reliant on digital connectivity, the security of our critical infrastructure is paramount. CISA defines...
Read more →Owing to its relative nascency, the realm of artificial intelligence (AI) has continued to undergo a rapid transformation while being...
Read more →Having been at ActiveState for nearly eight years, I’ve seen many iterations of our product. However, one thing has stayed...
Read more →The year 2024 threw up another diverse crop of stories in the world of cyber security, with much to pay...
Read more →INTERPOL has called for the term “romance baiting” to replace “pig butchering,” a phrase widely used to describe a manipulative...
Read more →KEY POINTS Rapid Vulnerability Exploitation: The Androxgh0st botnet has expanded its arsenal, exploiting 27 vulnerabilities across web servers, IoT devices,...
Read more →A threat actor looking to take over the Microsoft Azure cloud infrastructure of European companies has successfully compromised accounts of...
Read more →The first thing worth knowing about the first ever ransomware locker is that its use was apparently motivated by revenge...
Read more →The BADBOX botnet, a sophisticated cybercriminal operation, has compromised approximately 74,000 devices, including Android TV boxes, smartphones, and other electronics....
Read more →