Hackers Using Fake Microsoft ADFS Login Pages to Steal Credentials
A global phishing campaign is underway, exploiting a legacy Microsoft authentication system to steal user credentials and bypass multi-factor authentication...
Read more →A global phishing campaign is underway, exploiting a legacy Microsoft authentication system to steal user credentials and bypass multi-factor authentication...
Read more →A number of iOS and Android apps on Apple’s and Google’s official app stores contain a software development kit (SDK)...
Read more →Feb 05, 2025Ravie LakshmananMalware / Network Security A malware campaign has been observed delivering a remote access trojan (RAT) named...
Read more →Amazon Web Services (AWS) and Microsoft have not taken kindly to the UK competition watchdog’s proposal to take a targeted...
Read more →The Cybersecurity and Infrastructure Security Agency (CISA) has recently updated its Known Exploited Vulnerabilities (KEV) Catalog by adding several new...
Read more →Iranian-linked threat group Sharp Boys allegedly hacked at least five Israeli hotel reservation sites. “This connection is not private. This...
Read more →Several critical vulnerabilities affecting Mali Graphics Processing Units (GPUs) have surfaced, allowing hackers to exploit flaws in GPU drivers to...
Read more →Defense Tech companies that seek to maximize their chances of winning government contracts must understand current and future cybersecurity requirements....
Read more →Dynatrace announced the expansion of its security portfolio with a new Cloud Security Posture Management (CSPM) solution. For enterprises managing...
Read more →ICAO and ACAO Breached: Cyberespionage Groups Targeting Aviation Safety Specialists Pierluigi Paganini February 05, 2025 The International Civil Aviation Organization...
Read more →In an impressive demonstration of cost-effective AI research, a group of researchers has successfully replicated DeepSeek’s R1-Zero model for just...
Read more →Deepfakes and stolen Personally Identifiable Information (PII) can be used for more than hoaxes, phishing, and identity theft. Now, these...
Read more →