The Chinese cyber-espionage group Weaver Ant conducted a covert operation for over four years within the network...
Security
The Zoth protocol has reported a targeted attack in which an unauthorized actor gained access to a...
Over the weekend, an audio recording circulated on social media in which U.S. Vice President J.D. Vance...
The website of New York University (NYU) fell victim to a cyberattack that led to the exposure...
Over the past weekend (March 22–23), owners of DrayTek routers across the globe encountered a serious malfunction—devices...
Cybercriminals have begun exploiting Microsoft’s Trusted Signing service to digitally sign malicious software, making it appear secure...
In late February 2025, Binarly received a report of a suspicious incident within the UEFI ecosystem. A...
In Tennessee and California, Chinese nationals have been arrested on suspicion of orchestrating a new contactless fraud...
The French National Assembly voted against a proposal aimed at weakening the privacy protections of encrypted messaging...
Threat actors behind the Medusa Ransomware-as-a-Service (RaaS) operation have begun deploying a malicious driver known as ABYSSWORKER...
The FBI has issued a warning: free online document converters may lead to malware infections and, in...
Oracle has found itself at the center of public scrutiny following claims by a hacker operating under...
Cloudflare has officially announced the complete deprecation of the insecure HTTP protocol for accessing its API. Henceforth,...
An electrical engineer employed by the U.S. Department of Defense has become the subject of a criminal...
Hong Kong has enacted a new law aimed at strengthening cybersecurity measures for critical infrastructure systems. The...