A newly emerged ransomware known as Akira expands its operations to target Linux-based platforms which add the “.akira” file extension…
An Israeli company called Nokod Security has raised $8 million in early stage capital to work on technology to secure…
Security analysts have discovered a previously undocumented remote access trojan (RAT) named ‘EarlyRAT,’ used by Andariel, a sub-group of the…
New Ransomware Variant Recruit users for Russian Wagner Group. Recently, the cybersecurity researchers at Cyble Research and Intelligence Labs (CRIL)…
A flaw was discovered in Progress MOVEit Transfer, a popular third-party online transfer application. By exploiting the flaw, attackers compromised…
Threat intelligence infrastructure startup Cyware on Thursday announced it had secured $30 million in new financing alongside plans to take…
Criminal IP, an OSINT-based CTI search engine provided by AI SPERA, has recently announced the introduction of a bug bounty…
AI Tools have become extremely popular in the software industry and are currently in the initial phase of adoption by…
By Luca Rognoni, Chief Security Officer and Co-Founder, YEO Messaging Cyber threat landscape has dramatically expanded in recent years due…
Cybersecurity researchers at FortiGuard Labs recently found an unseen infostealer dubbed “ThirdEye” that is mainly crafted to steal several information…
By Bob Maley, CSO at Black Kite After last year’s good fight against ransomware gangs, CISOs thought they won. Overall…
[ This article was originally published here ] Executive summary is a technique that hackers use to gain unauthorized access…