Chinese-nexus threat actors attacked targets in Qatar in the days after the first US-Israeli strike in Iran, signalling a shift in regional strategy for China-backed advanced persistent threat (APT) ...
Government agencies, emergency clinics, and others in Australia, New Zealand, and Tonga have had serious run-ins with the prolific ransomware outfit.
For a change, there's little in this month's Patch Tuesday that should cause panic, according to security experts.
Data centers — used by both governments and militaries for operations — are now fair game, not just for cyberattacks, but for kinetic attacks as well.
With rapid advances in AI, we now enter an era of automated risk remediation. Read about readiness to leverage agentic AI for ...
Using Anthropic and OpenAI's AI systems — and a detailed playbook prompt — cyberattackers gained access to Mexico's agencies ...
Attackers operated an active C2 implant for up to a week and compromised AppSec vendor Xygeni's xygeni/xygeni-action in that time.
An undefined Chinese-speaking actor wields a combo of custom malware, open source tools, and LOTL binaries against Windows ...
Iran has been hacking IP cameras to plan missile strikes against its enemies, showing how cyber and kinetic warfare are fast ...
A campaign by Russian-speaking cyberattackers hijacks workflows to deliver security-busting malware, allowing attackers to steal data without detection.
Pakistan's APT36 threat group has begun using vibe-coding to churn out mediocre malware, but at a scale that could overwhelm ...
The cyberattacks blend malvertising with a ClickFix-style technique that highlights risky behavior with AI coding assistants and command-line interfaces.