May 31, 2024NewsroomCyber Attack / Credential Harvesting
The Russian GRU-backed threat actor APT28 has been attributed as behind a series of campaigns targeting networks...
May 30, 2024NewsroomLinux / Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting the Linux kernel to...
May 30, 2024NewsroomCyber Attack / Malware
Cloudflare on Thursday said it took steps to disrupt a month-long phishing campaign orchestrated by a Russia-aligned threat...
May 30, 2024NewsroomCyber Espionage / Threat Intelligence
A previously undocumented cyber espionage-focused threat actor named LilacSquid has been linked to targeted attacks spanning various...
May 30, 2024NewsroomWordPress / Website Security
Cybersecurity researchers have warned that multiple high-severity security vulnerabilities in WordPress plugins are being actively exploited by threat...
May 30, 2024NewsroomMalware / Cyber Crime
Europol on Thursday said it shut down the infrastructure associated with several malware loader operations such as IcedID,...
Security leaders are in a tricky position trying to discern how much new AI-driven cybersecurity tools could actually benefit a security operations center...