The threat actors initially attempted to compromise projects associated with the Coinbase cryptocurrency exchange, said Palo ...
A joint cybersecurity advisory warns organizations globally about the defense gap in detecting and blocking fast flux ...
Mandiant warned that Chinese espionage actor UNC5221 is actively exploiting a critical Ivanti vulnerability, which can lead ...
Of the 62% that said they suffered a cyber-attack in the past year, 80% were hit multiple times. Worse, 59% revealed that the ...
A novel skimming attack has been observed by Jscramber, using the Stripe API to steal payment information by injecting ...
The cybercriminal uses the service of Proton66, an infamous Russian-based bulletproof hosting provider, to deploy malware ...
A critical authentication bypass flaw in CrushFTP is under active exploitation following a mishandled disclosure process ...
A thousand UK service providers will be expected to comply with the forthcoming Cyber Security and Resilience Bill ...
BlueVoyant found that the use of lookalike domains in email-based attacks is allowing actors to extend the types of ...
A new attack targeting Microsoft Teams users used vishing, remote access tools and DLL sideloading to deploy a JavaScript ...
Gray bots surge as generative AI scraper activity increases, impacting web applications with millions of requests daily ...
Infosec Institute's Keatron Evans discusses how the cyber industry needs to adapt its hiring strategies to the modern age ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results