In October 2024, the Iran-linked group UNC2428 launched a large-scale social engineering campaign targeting Israeli users, posing...
Do Son
By early 2025, credential theft through malware had become a veritable goldmine for cybercriminals. Infostealers alone were...
Since early March 2025, cybersecurity specialists at Volexity have documented a series of highly sophisticated attacks targeting...
The ConfusedComposer vulnerability, uncovered by researchers at Tenable, stands as yet another illustration of how the internal...
South Korean telecommunications giant SK Telecom has reported a cyberattack that resulted in unauthorized access to sensitive...
Experts at Kaspersky Lab have uncovered widespread phishing campaigns employing malicious attachments in SVG format. According to...
Attacks leveraging infostealers delivered through phishing emails are surging at an alarming pace. According to a recent...
Microsoft has published the second report on the progress of its Secure Future Initiative (SFI) — the...
In recent times, cryptominers have begun to employ increasingly unconventional tactics, and a newly uncovered malicious campaign—identified...
In a recent study conducted by specialists at Varonis, researchers revealed a subtle yet highly effective method...
Since the announcement of Google’s Privacy Sandbox initiative in 2019, the company has consistently emphasized its goal...
In August 2024, Intel announced the layoff of 15,000 employees in an attempt to mitigate an internal...
Despite facing resistance, the Pakistan Telecommunication Authority (PTA) continues to advance efforts to regulate VPN applications, mandating...
The threat of software supply chain compromise has once again resurfaced: the Ripple-recommended library “xrpl.js”, used for...
The automation of exploit development is no longer a distant vision of the future—it is a present...