Apr 08, 2024NewsroomCybercrime / Network Security
Threat hunters have discovered a new malware called Latrodectus that has been distributed as part of email phishing...
Apr 08, 2024NewsroomCybersecurity / Malvertising
A new phishing campaign has set its eyes on the Latin American region to deliver malicious payloads to Windows...
Apr 08, 2024NewsroomInvestment Scam / Mobile Security
Google has filed a lawsuit against two app developers for engaging in an "international online consumer investment...
Apr 06, 2024NewsroomSkimmer / Threat Intelligence
Threat actors have been found exploiting a critical flaw in Magento to inject a persistent backdoor into e-commerce...
Apr 05, 2024NewsroomArtificial Intelligence / Supply Chain Attack
New research has found that artificial intelligence (AI)-as-a-service providers such as Hugging Face are susceptible to...
Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and the...
Apr 05, 2024NewsroomMalware / Endpoint Security
Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional malware dubbed Byakugan.
The starting...
Apr 05, 2024NewsroomAdvanced Persistent Threat
Multiple China-nexus threat actors have been linked to the zero-day exploitation of three security flaws impacting Ivanti appliances (CVE-2023-46805,...