New Silver Fox Campaign Hides ValleyRAT Inside Fake Telegram Chinese Language Pack Installer
A new malware campaign linked to the Silver Fox APT group has been discovered, using a fake Telegram Chinese language pack installer to secretly deliver…
A new malware campaign linked to the Silver Fox APT group has been discovered, using a fake Telegram Chinese language pack installer to secretly deliver…
New analysis of a fake Telegram installer uploaded to MalwareBazaar shows Silver Fox expanding its ValleyRAT operations with a fresh delivery chain that hides behind…
A hacking group linked to Russian military intelligence, identified as Forest Blizzard hackers (aka Fancy Bear), has been caught exploiting thousands of home and small-office…
In this Help Net Security video, Itamar Apelblat, CEO of Token Security, walks through findings from the company’s research, which shows that 65% of agentic…
Ravie LakshmananApr 08, 2026Vulnerability / Cloud Security The Russian threat actor known as APT28 (aka Forest Blizzard and Pawn Storm) has been linked to a fresh…
Immense concentration continues apace in the cloud industry, with hyperscalers expected to comprise 67% of global datacentre capacity by 2031, or 14 times the capacity…
Citigroup is using artificial intelligence to speed up account openings and the retirement of old software, the US bank’s head of technology, Tim Ryan, said,…
Hackers backing Tehran say an uncertain ceasefire between Iran and the United States and Israel won’t end their retaliatory cyberattacks, a warning that American cybersecurity…
Russia-linked APT28 uses PRISMEX to infiltrate Ukraine and allied infrastructure with advanced tactics Pierluigi Paganini April 08, 2026 APT28 targets Ukraine and allies with PRISMEX…
Executive Summary Our first article about the boundaries and resilience of Amazon Bedrock AgentCore focused on the Code Interpreter sandbox, and how it can be…
“Assuming the BrowserGate allegations are true, LinkedIn users should consider reducing the amount of identifiable, trackable, or sensitive data their browser exposes, and organizations should…
Huntress has been authorized by the Common Vulnerabilities and Exposures (CVE) Program as a CVE Numbering Authority (CNA). This sounds fancy (and it is), but…