7 Sessions Not to Miss at Black Hat USA 2024
This year’s conference will be a treasure trove of insights for cybersecurity professionals. This year’s conference will be a treasure…
Cyber Facts You Didn't Know
This year’s conference will be a treasure trove of insights for cybersecurity professionals. This year’s conference will be a treasure…
An unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration in email…
Searchable Encryption has long been a mystery. An oxymoron. An unattainable dream of cybersecurity professionals everywhere. Organizations know they must…
The latest in what will be a continuing arms race between creating and detecting videos: The new tool the research…
A threat actor known as Stargazer Goblin has set up a network of inauthentic GitHub accounts to fuel a Distribution-as-a-Service…
The remote access trojan known as Gh0st RAT has been observed being delivered by an “evasive dropper” called Gh0stGambit as…
French judicial authorities, in collaboration with Europol, have launched a so-called “disinfection operation” to rid compromised hosts of a known…
Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that targets Apple macOS systems with…
A large text-message phishing attack campaign attributed to the China-based Smishing Triad employs malicious iMessages. A large text-message phishing attack…
Google says it recently fixed an authentication weakness that allowed crooks to circumvent the email verification required to create a…