A sophisticated traffic distribution system (TDS) hiding behind education-themed domains. The operation uses bulletproof hosting to deliver phishing pages, scams,…
Malcolm Jack wants you to understand that when it comes to cybersecurity, people are just as important as technology. Jack…
Microsoft announced that it will disable the 30-year-old NTLM authentication protocol by default in upcoming Windows releases due to security vulnerabilities…
A sneaky Android spyware called GhostChat, which tricks Pakistan-based users with romance scams via WhatsApp. The malware grabs sensitive data…
Subpostmasters who suffered at the hands of errors in the Post Office’s Capture software, like Horizon users, are receiving derisory…
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Dive Brief:…
A new Android threat campaign has emerged that uses social engineering combined with a legitimate machine learning platform to spread…
A sophisticated Android RAT campaign that exploits Hugging Face’s popular machine learning platform to host and distribute malicious payloads. Attackers…
30 Jan Cybersecurity Predictions for 2026 Posted at 10:57h in Blogs by Taylor Fox Six Predictions for the AI-Driven SOC…
As U.S. manufacturing firms weather a constant barrage of cyberattacks, the various industries in that sector — which underpin everything…
Millions of devices used as proxies by cybercriminals, espionage groups and data thieves have been removed from circulation following Google’s…
A new wave of targeted attacks has emerged against Internet Information Services (IIS) servers across Asia, with threat actors deploying…

