Put ROCs before SOCs, Qualys tells public sector
The security operations centre (SOC) has served public sector cyber teams well over the years but is fundamentally a reactive tool and now needs to…
The security operations centre (SOC) has served public sector cyber teams well over the years but is fundamentally a reactive tool and now needs to…
The Main Intelligence Directorate (GUR) of Ukraine’s Ministry of Defense claims it hacked the Russian aerospace and defense company Tupolev, which develops Russia’s supersonic strategic…
Business Email Compromise (BEC) attacks don’t need malware to do damage. All it takes is one convincing message; a fake login prompt, a cleverly disguised…
A newly uncovered campaign involving an Atomic macOS Stealer (AMOS) variant has emerged, showcasing the evolving sophistication of multi-platform social engineering attacks. This campaign, discovered…
Earlier today, law enforcement seized multiple domains of BidenCash, the infamous dark web market for stolen credit cards, personal information, and SSH access. The illegal…
Threat actors have successfully adapted to Google’s stringent accessibility restrictions introduced in Android 13 and later versions. These safeguards, rolled out in May 2022, were…
Police and intelligence agencies are turning to AI to sift through vast amounts of data to identify security threats, potential suspects and individuals who may…
A financially motivated hacker group has been targeting Salesforce instances for months in a campaign that uses voice phishing to engage in data theft and…
The FBI is warning about a new scam where cybercriminals exploit NFT airdrops on the Hedera Hashgraph network to steal crypto from cryptocurrency wallets. Airdrops…
A cybercriminal group known as SCATTERED SPIDER has emerged as a formidable threat, targeting sectors like hospitality, telecommunications, finance, and retail with unprecedented sophistication. This…
Jun 04, 2025Ravie Lakshmanan Threat Intelligence / Data Breach Google has disclosed details of a financially motivated threat cluster that it said “specialises” in voice…
Listen to the article 4 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief: Nearly 35,000 solar power devices…