We are used to clicking through human verification tests and browser updates without second thoughts, but a new threat is…
So-called ClickFix or ClearFake attacks that bypass security controls and use unwitting victims to execute a cyber attack of their…
A sophisticated proof-of-concept demonstrating how malware can bypass advanced call stack detection mechanisms increasingly adopted by enterprise security vendors like…
Attackers are exploiting a recently revealed vulnerability (CVE-2025-59718) to bypass authentication on Fortinet’s FortiGate firewalls, and are leveraging the achieved…
Token’s Wireless Biometrics Pay for Themselves Starting Day One For nearly twenty years enterprises have been told the same thing….
Microsoft has confirmed that its December 2025 Windows security update (KB5071546, OS Build 19045.6691) is causing Message Queuing (MSMQ) failures,…
The Women in Cybersecurity Report, a 12-minute video hosted by Cybercrime Magazine Deputy Editor Amanda Glassner, highlights the latest breakthroughs, voices, and…
A PDF named “NEW Purchase Order # 52177236.pdf” turned out to be a phishing lure. So we analyzed the phishing…
Singularity, a sophisticated Linux kernel rootkit designed for Linux kernel versions 6.x, has gained significant attention from the cybersecurity community…
The threat actor known as Jewelbug has been increasingly focusing on government targets in Europe since July 2025, even as…
Askul data breach exposed over 700,000 records after ransomware attack Pierluigi Paganini December 17, 2025 Askul disclosed that an October…
Microsoft has asked businesses to reach out for advice on how to temporarily mitigate a known Message Queuing (MSMQ) issue causing enterprise apps and…
