Hackers have been exploiting an unpatched Adobe Reader vulnerability for months
Adam Marrè, CISO at Arctic Wolf, said that what makes this new vulnerability particularly concerning is that it’s being actively exploited and appears to work…
Adam Marrè, CISO at Arctic Wolf, said that what makes this new vulnerability particularly concerning is that it’s being actively exploited and appears to work…
Tax refund fraud remains a persistent and evolving threat within cybercrime and fraud communities. Threat actors actively advertise and refine schemes designed to file fraudulent…
It’s not exactly breaking news that cyber threats to critical infrastructure have become a major concern for state and local governments. But if it feels…
A new Lua-based malware, called LucidRook, is being used in spear-phishing campaigns targeting non-governmental organizations and universities in Taiwan. Cisco Talos researchers attribute the malware…
A newly discovered remote access trojan called STX RAT has emerged as a serious cybersecurity threat in 2026, combining hidden remote desktop access with credential-stealing…
After a successful Year 9 Demo Day, Cyber Security Academic Startup Accelerator Programme (CyberASAP) is gaining momentum towards its 10th anniversary kick off, which is due to…
A recently observed phishing campaign is abusing Google Cloud Storage to deliver the Remcos remote access trojan (RAT), relying on trusted Google infrastructure and a…
The digital world is more fragile than many businesses like to admit. Despite escalating cyber threats, stricter regulatory requirements and increased reliance on digital infrastructure,…
Austin, Texas, United States, April 9th, 2026, CyberNewswire Built by a veteran security team and led by a former Google and Mandiant executive, Mallory delivers…
In the latest demonstration of how AI assistants can help with bug hunting, Horizon3.ai researcher Naveen Sunkavally used Claude to unearth CVE-2026-34197, a remote code…
Every tech company tells you your data is safe. They’ve (hopefully) got encryption, access controls, and zero-trust architectures—the whole glossy security brochure. And then someone…
Ravie LakshmananApr 09, 2026Malware / Windows Security A previously undocumented threat cluster dubbed UAT-10362 has been attributed to spear-phishing campaigns targeting Taiwanese non-governmental organizations (NGOs) and…