Security researchers at Straiker’s AI Research (STAR) team have uncovered Villager, an AI-native penetration testing framework developed by Chinese-based group…
In early September, Qrator Labs detected and mitigated one of the most significant L7 DDoS attacks seen this year, carried…
Now more than ever before, our healthcare data is under attack. Of all of the sensitive information available on the…
The OWASP MAS project continues to lead the way in mobile application security. This article describes the resources and tools…
HybridPetya ransomware bypasses UEFI Secure Boot echoing Petya/NotPetya Pierluigi Paganini September 13, 2025 HybridPetya ransomware bypasses UEFI Secure Boot to…
Okta Threat Intelligence exposes VoidProxy, a new PhaaS platform. Learn how this advanced service uses the Adversary-in-the-Middle technique to bypass…
The U.S. Federal Bureau of Investigation (FBI) has issued a flash alert to release indicators of compromise (IoCs) associated with…
A sophisticated malvertising campaign has emerged, exploiting GitHub repositories through dangling commits to distribute malware via fake GitHub Desktop clients….
A sophisticated malware campaign has emerged that leverages artificial intelligence to create deceptively legitimate applications, marking a significant evolution in…
A sophisticated backdoor malware known as Backdoor.WIN32.Buterat has emerged as a significant threat to enterprise networks, demonstrating advanced persistence techniques…
The well-known group of cybercriminals called Scattered Lapsus$ Hunters released a surprising farewell statement on BreachForums. This manifesto, a mix…
Cybersecurity researchers have uncovered a sophisticated malware campaign that exploits SVG (Scalable Vector Graphics) files and email attachments to distribute…











