A novel twist in the ongoing ClickFix malware campaigns has security researchers observing the abuse of the...
phishing
In a significant enforcement action, the U.S. Department of Justice announced that five individuals have pleaded guilty...
The United States Department of Justice has initiated a significant offensive against transnational criminal organizations operating large-scale...
Google has initiated a significant legal action aimed at dismantling a sophisticated China-based cybercrime operation known as...
The DanaBot malware operation has resumed its malicious activities, deploying a new version in active campaigns just...
The Rhadamanthys infostealer operation has experienced a significant disruption, with multiple users of this Malware-as-a-Service (MaaS) platform...
A sudden, unexplained CPU spike on a corporate server, often dismissed as a minor performance issue, was...
A new phishing automation platform named Quantum Route Redirect is actively targeting Microsoft 365 users worldwide, leveraging...
Security teams are facing a significant shift in the phishing landscape as attackers increasingly pivot from email...
A new variant of the FileFix social engineering attack is leveraging cache smuggling to secretly download malicious...
The cyberattack on Jaguar Land Rover in early September 2025 has escalated into a prolonged crisis, halting...
The wave of high-profile cyber attacks targeting UK businesses in 2025 is not a series of isolated...
The cyber extortion group ShinyHunters has intensified its ongoing campaign targeting major enterprises by launching a dedicated...
Microsoft has initiated a significant security update for its Outlook email clients, specifically targeting the use of...
Cybersecurity researchers have identified two sophisticated Android spyware campaigns, named ProSpy and ToSpy, that are impersonating the...
Allianz Life Insurance Company of North America has confirmed that a July 2025 cyberattack compromised the personal...
A new phishing and malware distribution toolkit called MatrixPDF enables attackers to convert ordinary PDF files into...
With 88% of data breaches involving stolen credentials, the inherent weaknesses of password-based authentication are a primary...
The threat landscape for phishing attacks has fundamentally shifted. While email security gateways have been a primary...
Microsoft 365’s position as the dominant enterprise productivity suite has made it the single biggest risk in...