North Korean threat actors use JSON sites to deliver malware via trojanized code Pierluigi Paganini November 17, 2025 North Korean…
A sandbox escape vulnerability affecting iPhones and iPads running iOS 16.2 beta 1 or earlier versions. The proof-of-concept (POC) exploits…
The network perimeter no longer exists. Employees are as likely to log in from a coffee shop or airport lounge…
The U.S. Justice Department announced major actions against North Korean cybercrime, including five people admitting guilt and the government taking…
A sharp increase in attacks targeting a critical vulnerability in XWiki servers. Multiple threat actors are actively exploiting CVE-2025-24893 to deploy botnets…
A study by Boston Consulting Group (BCG) suggests that organisations that lead in technology development are gaining a first-mover advantage…
RondoDox expands botnet by exploiting XWiki RCE bug left unpatched since February 2025 Pierluigi Paganini November 17, 2025 RondoDox botnet…
Welcome to The researcher’s desk – a content series where the Detectify security research team conducts a technical autopsy on…
Samsung has been accused of shipping budget Galaxy A and M series smartphones with pre-installed spyware that users can’t easily…
AI is spreading faster than any major technology in history, according to a Microsoft report. More than 1.2 billion people…
November 14, 2025 – Contacted out of the blue for a virtual interview? Be cautious. Attackers are using fake interviews…
A threat actor known as “888” has purportedly dumped sensitive data stolen from electronics giant LG Electronics, raising alarms in…