Webinar — A MythBusting Special: 9 Myths about File-based Threats
Bad actors love to deliver threats in files. Persistent and persuasive messages convince unsuspecting victims to accept and open files…
Bad actors love to deliver threats in files. Persistent and persuasive messages convince unsuspecting victims to accept and open files…
The North Korea-linked threat actor tracked as APT37 has been linked to a piece of new malware dubbed M2RAT in…
Threat actors are leveraging known flaws in Sunlogin software to deploy the Sliver command-and-control (C2) framework for carrying out post-exploitation…
A joint law enforcement operation conducted by Germany, the Netherlands, and Poland has cracked yet another encrypted messaging application named…
The Computer Emergency Response Team of Ukraine (CERT-UA) has issued an alert warning of cyber attacks against state authorities in…
A Russian national on February 7, 2023, pleaded guilty in the U.S. to money laundering charges and for attempting to…
To succeed as a cybersecurity analyst, you need to understand the traits, values, and thought processes of hackers, along with…
A Russia-linked threat actor has been observed deploying a new information-stealing malware in cyber attacks targeting Ukraine. Dubbed Graphiron by…
A Sydney man has been sentenced to an 18-month Community Correction Order (CCO) and 100 hours of community service for…
Multiple unpatched security flaws have been disclosed in open source and freemium Document Management System (DMS) offerings from four vendors…