Security teams worldwide must stay updated on the latest detection rules and emerging threats to defend against...
Cyber Threats
A federal judge has issued a directive to the Trump administration to preserve Signal messages exchanged among...
Confidential contact information belonging to former Trump administration officials was reportedly discovered publicly accessible online, raising significant...
A threat actor has allegedly obtained and leaked approximately 10GB of stolen login credentials, posing a significant...
A new ransomware-as-a-service (RaaS) operation dubbed “VanHelsing” has surfaced, targeting multiple operating systems and employing double extortion...
Security researchers have identified a new campaign where threat actors are leveraging Microsoft’s .NET Multi-platform App UI...
A recent ASEC report reveals intensifying cyber threats against financial institutions in South Korea and worldwide, with...
Ransomware and Dark Web Threats Escalate in March 2025: New Extortion Tactics and Hacktivist Attacks
Ransomware and Dark Web Threats Escalate in March 2025: New Extortion Tactics and Hacktivist Attacks
The second week of March 2025 witnessed a surge in cybercriminal operations, marked by the emergence of...
A sophisticated malware campaign dubbed “Arcane Stealer” is actively targeting gamers and VPN users through compromised YouTube...
The XE Group, a cybercrime syndicate with suspected Vietnamese origins, has dramatically evolved its operations from traditional...
A sophisticated phishing campaign dubbed “0ktapus” successfully bypassed multi-factor authentication (MFA) protections to compromise over 130 organizations,...
Ransom.MSIL.THANOS.THABGBA is a ransomware strain targeting Windows systems, classified as a low-risk threat due to its limited...
Artificial intelligence systems that deviate from their intended objectives—known as Rogue AI—are emerging as a critical cybersecurity...
The 2024 MITRE ATT&CK® Evaluations for Enterprise reveal critical insights into ransomware and macOS threats, with vendors...
A malicious campaign is targeting security researchers by distributing a fake proof-of-concept (PoC) exploit for the LDAPNightmare...
Check Point Research has uncovered a sophisticated phishing campaign leveraging Google Firebase to host fraudulent pages mimicking...
ESET Research has uncovered a series of cyberespionage campaigns conducted by the advanced persistent threat (APT) group...
ESET researchers have uncovered a significant evolution in the operations of the Telekopye cybercriminal network, which has...
ESET’s latest APT Activity Report for Q2-Q3 2024 reveals significant developments in state-aligned cyber threats, with China,...
The second half of 2024 has seen significant shifts in the cyberthreat landscape, according to ESET’s latest...