Fig Security emerges from stealth with $38M to help security teams deal with change
For enterprises, being able to study data unlocks much more than new ways to make money. The modern enterprise tech stack is mind-bogglingly complex —…
For enterprises, being able to study data unlocks much more than new ways to make money. The modern enterprise tech stack is mind-bogglingly complex —…
Coruna is also notable for its use by three distinct hacking groups. Google first detected its use in February of last year in an operation…
Executive summary The January 2026 seizure of RAMP disrupted a major ransomware coordination hub, but it did not dismantle the ecosystem behind it. Instead, it…
Symantec researchers identified cyber activity linked to the Iranian advanced persistent threat group Seedworm across the networks of several U.S. organizations, with intrusions beginning in…
I. OVERVIEW Continuing the series of studies on exploiting the Bindlink API to tamper with Antivirus/EDRs. This time, I will use “bindflt.sys” to prevent…
ESET researchers have identified an Android malware implant that uses generative AI (GenAI) for persistence purposes. This malicious implant is an advanced version of VNCSpy,…
Why OT Defenses Often Start Too Late Industrial organizations are facing a growing paradox in cybersecurity. While operational technology (OT) environments are increasingly connected, most…
UPD 30.01.2026: Added technical details about the attack chain and more IoCs. On January 20, a supply chain attack has occurred, with the infected software…
In fact, Check Point says it tracked similar Iranian targeting of cameras as early as last June during Israel’s previous 12-day war with Iran. The…
U.S. and European law enforcement have seized the database from LeakBase, which prosecutors have touted as “one of the world’s largest online forums for cybercriminals”…
Process separation remains one of the most important parts of the Firefox security model and securing our IPC (Inter-Process Communication) interfaces is crucial to keep…
Palo Alto Networks CEO Nikesh Arora said in a statement, “I commend ONCD Director [Sean] Cairncross and the National Cyber Strategy for the forward-looking approach…