Apr 22, 2024NewsroomRootkit / Software Security
New research has found that the DOS-to-NT path conversion process could be exploited by threat actors to achieve...
Apr 22, 2024NewsroomCryptocurrency / Artificial Intelligence
Microsoft has revealed that North Korea-linked state-sponsored cyber actors has begun to use artificial intelligence (AI) to make...
A new information stealer has been found leveraging Lua bytecode for added stealth and sophistication, findings from McAfee Labs reveal.
The cybersecurity firm has...
Apr 20, 2024NewsroomVulnerability / Endpoint Security
Users of the CrushFTP enterprise file transfer software are being urged to update to the latest version following...
Apr 20, 2024NewsroomVulnerability / Network Security
Palo Alto Networks has shared more details of a critical security flaw impacting PAN-OS that has come under...
Apr 19, 2024NewsroomNetwork Security / Firmware Security
Technology, research, and government sectors in the Asia-Pacific region have been targeted by a threat actor called...
Threat actors behind the Akira ransomware group have extorted approximately $42 million in illicit proceeds after breaching the networks of more than 250...