INTERPOL is advocating for a shift in terminology to combat online relationships and investment fraud. The international police organization is…
The VIPKeyLogger infostealer, exhibiting similarities to the Snake Keylogger, is actively circulating through phishing campaigns. Delivered as attachments disguised as…
In an era where we are completely reliant on digital connectivity, the security of our critical infrastructure is paramount. CISA defines…
Owing to its relative nascency, the realm of artificial intelligence (AI) has continued to undergo a rapid transformation while being…
Having been at ActiveState for nearly eight years, I’ve seen many iterations of our product. However, one thing has stayed…
The year 2024 threw up another diverse crop of stories in the world of cyber security, with much to pay…
INTERPOL has called for the term “romance baiting” to replace “pig butchering,” a phrase widely used to describe a manipulative…
KEY POINTS Rapid Vulnerability Exploitation: The Androxgh0st botnet has expanded its arsenal, exploiting 27 vulnerabilities across web servers, IoT devices,…
A threat actor looking to take over the Microsoft Azure cloud infrastructure of European companies has successfully compromised accounts of…
The first thing worth knowing about the first ever ransomware locker is that its use was apparently motivated by revenge…
The BADBOX botnet, a sophisticated cybercriminal operation, has compromised approximately 74,000 devices, including Android TV boxes, smartphones, and other electronics….
Cybersecurity experts are sounding the alarm over a new strain of malware dubbed “I2PRAT,” which leverages encrypted peer-to-peer (P2P) communication…











