Fake Job Applications Deliver Dangerous More_eggs Malware to HR Professionals
A spear-phishing email campaign has been observed targeting recruiters with a JavaScript backdoor called More_eggs, indicating persistent efforts to single…
Cyber Facts You Didn't Know
A spear-phishing email campaign has been observed targeting recruiters with a JavaScript backdoor called More_eggs, indicating persistent efforts to single…
The prolific Chinese APT Mustang Panda is the likely culprit behind a sophisticated cyber-espionage attack that sets up persistent remote…
A little over a dozen new security vulnerabilities have been discovered in residential and enterprise routers manufactured by DrayTek that…
Organizations looking to maximize their security posture will find AI a valuable complement to existing people, systems, and processes. Organizations…
Cybersecurity researchers have disclosed that 5% of all Adobe Commerce and Magento stores have been hacked by malicious actors by…
Improvements in cybersecurity and basics like patching aren’t keeping pace with the manufacturing sector’s rapid growth. Improvements in cybersecurity and…
Dynamic malware analysis is a key part of any threat investigation. It involves executing a sample of a malicious program…
Three different organizations in the U.S. were targeted in August 2024 by a North Korean state-sponsored threat actor called Andariel…
Governor Newsom has vetoed the state’s AI safety bill. I have mixed feelings about the bill. There’s a lot to…
Prioritizing security as a critical element to an organization’s effectiveness and success will reduce the risk of incidents, while benefiting…