A new post-exploitation command-and-control (C2) evasion method called ‘Ghost Calls’ abuses TURN servers used by conferencing apps like Zoom and…
Google has confirmed that one of its corporate Salesforce instances was compromised in June by the threat group tracked as…
A sophisticated cybercrime campaign has been discovered targeting Android users through fake antivirus applications that actually deliver LunaSpy spyware to…
The UK’s National Cyber Security Centre (NCSC) has rolled out a series of updates to its Cyber Assessment Framework (CAF)…
WhatsApp cracks down on 6.8M scam accounts in global takedown Pierluigi Paganini August 06, 2025 WhatsApp removed 6.8M accounts linked…
LAS VEGAS — Collaboration between agencies like the Cybersecurity and Infrastructure Security Agency (CISA) and private industry remains essential to build…
Nigerian national Chukwuemeka Victor Amachukwu has been extradited from France to the U.S. to face charges of hacking, fraud, and…
A sophisticated new cyber campaign has emerged targeting Windows users through a deceptive malware variant known as ToneShell, which masquerades…
UAC-0099 is a threat actor organization that has been targeting state officials, defense forces, and defense-industrial firms in a series…
Dive Brief: More than 20 of the United States’ top energy companies are vulnerable to cyberattacks because they use equipment…
In a sophisticated campaign uncovered in early 2024, cybercriminals have begun distributing malicious Ethereum smart contracts masquerading as lucrative trading…
Threat actors are increasingly leveraging generative AI (GenAI) tools to craft highly convincing phishing websites that impersonate legitimate government portals….











