Security researchers have identified a new campaign where threat actors are leveraging Microsoft’s .NET Multi-platform App UI...
News
The latest revision of NIST SP 800-82 (r3) provides critical guidance for securing Operational Technology (OT) systems,...
Join us for an engaging series of book talks in March 2024 featuring discussions on Chasing Shadows,...
Google’s Threat Analysis Group (TAG) has released its Q2 2023 bulletin, providing critical insights into coordinated influence...
Google’s Threat Analysis Group (TAG) has released its quarterly bulletin revealing the termination of thousands of accounts...
Security researchers have uncovered a sophisticated malware campaign distributing the LummaC2 information stealer disguised as a cracked...
A recent ASEC report reveals intensifying cyber threats against financial institutions in South Korea and worldwide, with...
AhnLab’s Threat Intelligence Platform has released 19 new Snort rules addressing critical vulnerabilities including PostgreSQL SQL injection...
Ransomware and Dark Web Threats Escalate in March 2025: New Extortion Tactics and Hacktivist Attacks

Ransomware and Dark Web Threats Escalate in March 2025: New Extortion Tactics and Hacktivist Attacks
The second week of March 2025 witnessed a surge in cybercriminal operations, marked by the emergence of...
A newly discovered malware campaign is leveraging the JPHP interpreter – a PHP implementation running on the...
Security teams worldwide are grappling with widespread exploitation of Ivanti Connect Secure VPN appliances, as researchers uncover...
Recent forensic investigations by Volexity have uncovered a sophisticated attack campaign exploiting two chained zero-day vulnerabilities in...
A critical zero-day vulnerability (CVE-2024-3400) in Palo Alto Networks’ PAN-OS firewalls has been actively exploited since at...
A critical zero-day vulnerability (CVE-2024-3400) in Palo Alto Networks’ PAN-OS GlobalProtect feature has been actively exploited since...
A China-linked cyberespionage group known as StormBamboo (also tracked as Evasive Panda, Daggerfly, and Bronze Highland) has...
In early 2022, Russian state-sponsored threat actor APT28 (also tracked as GruesomeLarch) deployed a novel attack vector...
A sophisticated malware campaign dubbed “Arcane Stealer” is actively targeting gamers and VPN users through compromised YouTube...
The XE Group, a cybercrime syndicate with suspected Vietnamese origins, has dramatically evolved its operations from traditional...
Active Directory’s Discretionary Access Control Lists (DACLs) serve as fundamental security mechanisms governing object permissions within directory...
Active Directory Discretionary Access Control Lists (DACLs) serve as a fundamental security mechanism governing access to directory...