A sophisticated new variant of the North Korean-linked Contagious Interview campaign has emerged, featuring an unprecedented level of polish and…
Cybercriminals are using browser push notifications to deliver malware and phishing attacks. Researchers at BlackFog described how a new command-and-control…
Nov 24, 2025Ravie LakshmananVulnerability / Container Security Cybersecurity researchers have discovered five vulnerabilities in Fluent Bit, an open-source and lightweight…
While the role of chief digital officer (CDO) is regarded as quite diverse, a study from Deloitte suggests CDO’s recognise…
Listen to the article 2 min This audio is auto-generated. Please let us know if you have feedback. One of…
Author: Gene Moody, Field CTO at Action1 For many IT leaders, the warning signs appeared gradually: devices slipping out of…
A massive resurgence of the Sha1-Hulud supply chain malware has struck the open-source ecosystem, compromising over 800 npm packages and…
A new era of web-delivered malware has arrived with EtherHiding, a technique that fundamentally reshapes how attackers distribute and rotate…
The Shai Hulud npm worm has re-emerged, launching an aggressive new attack on the software development world. This worm, which…
Some cybersecurity advice has been around for ages: Frequently change passwords, avoid public Wi-Fi. But most experts say a lot…
Harvard University disclosed over the weekend that its Alumni Affairs and Development systems were compromised in a voice phishing attack,…
India-aligned threat group Dropping Elephant has launched a sophisticated multi-stage cyberattack targeting Pakistan’s defense sector using a Python-based remote access…
