A newly surfaced cybercampaign targeting Israeli users has thrust the sophisticated RHADAMANTHYS information stealer into the spotlight. Originating from Russian-speaking…
Deep learning models analyzing API sequences for Windows malware detection face challenges due to evolving malware variants. A group of…
I have now had the privilege of attending RSA for over 20 years, yet this conference never grows old! My…
A vulnerability in Microsoft 365 (formerly Office 365) has been found that allows malicious actors to bypass anti-phishing measures. One…
Aug 07, 2024Ravie LakshmananCybersecurity / Incident Response Cybersecurity company CrowdStrike has published its root cause analysis detailing the Falcon Sensor…
Apple has announced changes to its macOS Gatekeeper security feature with the release of macOS Sequoia. These changes aim to…
Elastic is accelerating the adoption of AI-driven security analytics by automating SIEM data onboarding with Automatic Import. This new feature…
Aug 07, 2024Ravie LakshmananCloud Security / Cyber Espionage An unnamed media organization in South Asia was targeted in November 20233…
Listen to this podcast We speak to Google’s director of product management for confidential computing about ensuring the protection of…
Two cross-site scripting vulnerabilities (CVE-2024-42009, CVE-2024-42008) affecting Roundcube could be exploited by attackers to steal users’ emails and contacts, email…
A lawsuit has been filed against National Public Data, a background check service owned by Jerico Pictures Inc, for an…
New Android spyware LianSpy relies on Yandex Cloud to avoid detection Pierluigi Paganini August 07, 2024 A previously unknown Android…











