Threat actors use hacked domain control to host malicious content by leveraging legitimate domains to evade detection by security measures. …
Researchers Test Zero-click Worms that Exploit Generative AI Apps 3 A new study dubbed ComPromptMized, warns of zero-click worms exploiting…
A California federal judge has ordered spyware maker NSO Group to hand over the code for Pegasus and other spyware…
Mar 05, 2024NewsroomCybercrime / Malware A new DNS threat actor dubbed Savvy Seahorse is leveraging sophisticated techniques to entice targets…
Derby City Council has signed a £7m contract to extend the use of artificial intelligence (AI) copilot technology across more…
A cybercriminal threat actor known as TA577 has been identified as employing a new attack strategy to steal NT LAN…
We’re going to let you in on a little cybersecurity secret… There’s malware on Mac computers. There pretty much always…
Mar 05, 2024NewsroomAttack Surface / Exposure Management Startups and scales-ups are often cloud-first organizations and rarely have sprawling legacy on-prem…
The European Commission (EC) approved the Project of Common European Interest – Cloud Infrastructure and Services (IPCEI-CIS) programme in late…
Watch out for the new CHAVECLOAK banking Trojan as it spreads its infection through SMS phishing (SMishing), phishing emails, and…
A threat actor specializing in establishing initial access to target organizations’ computer systems and networks is using booby-trapped email attachments…
Mar 05, 2024NewsroomEmail Security / Network Security The threat actor known as TA577 has been observed using ZIP archive attachments…











