Several ransomware groups have begun actively deploying a strain of malware known as Skitnet during the post-exploitation...
cybersecurity
At the BUILD 2025 conference, Microsoft announced the integration of post-quantum cryptography (PQC) into Windows Insider preview...
A threat actor known as Hazy Hawk has launched a widespread campaign to seize abandoned cloud assets...
Amid a surge in attacks targeting exposed internet-facing services, cybersecurity experts have identified a new malicious campaign...
For over eight months, a cybercriminal group has been distributing trojanized versions of the KeePass password manager,...
Threat actors continue to exploit popular open-source repositories as launchpads for the distribution of malicious code. This...
The high-profile cyberattack on the British retail chain Marks & Spencer has taken a new turn. Sources...
Since February 2024, the Chrome Web Store has been hosting malicious browser extensions disguised as useful utilities,...
Every smartphone owner knows the first essential step with a new device: enabling screen lock. Most users...
Pwn2Own 2025 has concluded in Berlin, marking one of the most significant showcases of zero-day vulnerabilities in...
Hackers have compromised the official website of RVTools—a widely used utility for managing VMware virtual infrastructures—and replaced...
The developers have released updates for several versions of the Linux kernel, including 6.14.7 and other actively...
A method for concealing change history has been uncovered in Git, capable of misleading even seasoned digital...
Recent research has demonstrated novel techniques for injecting malicious code into Windows processes without relying on traditional...
Japan has officially abandoned its longstanding restraint in cyberspace. On May 16, a landmark law was enacted,...