Airbus has launched an investigation after a hacker leaked information allegedly stolen from the French aerospace giant’s systems. Cybercrime intelligence…
Redfly group infiltrated an Asian national grid as long as six months Pierluigi Paganini September 13, 2023 A threat actor…
A new ransomware strain called 3AM has been uncovered after a threat actor used it in an attack that failed…
The versatility of malware sandboxes extends beyond behavioral analysis, making them a valuable assets in many contexts. The list of…
Cisco has updated its full-stack observability platform with the latest version of Cisco Secure Application, designed to help IT departments…
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by…
Virtual conference will explore cybersecurity use-cases for artificial intelligence (AI) technology and the race to protect LLM algorithms from adversarial…
CVE Number CVE Title Impact Max Severity Tag CVE-2023-4863 Chromium: CVE-2023-4863 Heap buffer overflow in WebP Microsoft Edge (Chromium-based) CVE-2023-41764…
In recent years, Linux systems gained prominence among diverse threat actors, with more than 260,000 unique samples emerging in H1…
Enterprise macOS users are being targeted by attackers slinging new information-stealing malware dubbed MetaStealer. The MetaStealer malware MetaStealer is delivered…
There is a new battlefield. It is global and challenging to defend. What began with a high-profile incident back in…
A threat actor tracked in Microsoft’s taxonomy as Storm-0324 has been observed switching up its tactics to incorporate social engineering…