Check Point has identified a dozen attacks in September that bore the LockBit stamp, with half of them attributed to the ...
The activity, attributed by ESET to the North Korea-aligned Lazarus Group, marks the latest phase of Operation DreamJob, a ...
A cyber-espionage campaign by Pakistan’s TransparentTribe has been identified, targeting Indian government systems using ...
ToolShell exploit activity surged last quarter, appearing in over 60% of Cisco Talos IR cases and driving a sharp rise in ...
The operation uses verified Google Ads, fake news websites and deepfake videos to lure victims into a fraudulent investment ...
EDR tools are falling short as threats evolve. Explore how fast-moving adversaries are exploiting defender tools, creating a ...
Researchers at Forescout’s Vedere Labs have discovered two new vulnerabilities in TP-Link ’s Omada and Festa VPN routers that ...
AI-driven social engineering is set to be one of the most significant cyber threats in 2026, a new ISACA report revealed. The ...
Microsoft has revoked over 200 fraudulent code-signing certificates used in a ransomware campaign involving fake Teams ...
A spear phishing campaign dubbed PhantomCaptcha targeted Ukraine’s war relief efforts and regional government administrations ...
The Dutch Data Protection Authority issued Experian a €2.7m for GDPR violations including excessive collection of personal ...
The Coldriver hacking group reportedly shifted its operation quickly after the May 2025 public disclosure of its LostKeys ...