Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. A top…
Multiple threat actors are compromising Microsoft 365 accounts in phishing attacks that leverage the OAuth device code authorization mechanism. Attackers trick…
Three major ransomware groups have joined forces to create what cybersecurity experts are calling one of the most concerning developments…
In an era where remote work is the norm, it can be hard to know for sure who is on…
The CL0P ransomware group appears to be targeting internet-facing Gladinet CentreStack file servers in its latest extortion campaign. The Curated…
Multiple threat groups have been ramping up attacks using a technique called device code phishing to trick users into granting…
Criminal IP (criminalip.io), the AI-powered threat intelligence and attack surface monitoring platform developed by AI SPERA, is now officially integrated into…
Westminster City Council has said that “potentially sensitive and personal” data was stolen by hackers during the cyber attack that…
Dive Brief: Apartment owner and developer Rockrose Development Corp. recently found that unauthorized individuals hacked its systems and claimed to…
The UEFI firmware implementation in some motherboards from ASUS, Gigabyte, MSI, and ASRock is vulnerable to direct memory access (DMA) attacks…
Scripted Sparrow is a newly identified Business Email Compromise (BEC) group operating across three continents. Their operations are vast, leveraging…
Cybersecurity researchers have disclosed details of a new campaign that has used cracked software distribution sites as a distribution vector…
