Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails
An unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration in email…
Identity illuminated
An unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration in email…
Searchable Encryption has long been a mystery. An oxymoron. An unattainable dream of cybersecurity professionals everywhere. Organizations know they must…
The latest in what will be a continuing arms race between creating and detecting videos: The new tool the research…
A threat actor known as Stargazer Goblin has set up a network of inauthentic GitHub accounts to fuel a Distribution-as-a-Service…
The remote access trojan known as Gh0st RAT has been observed being delivered by an “evasive dropper” called Gh0stGambit as…
French judicial authorities, in collaboration with Europol, have launched a so-called “disinfection operation” to rid compromised hosts of a known…
Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that targets Apple macOS systems with…
A large text-message phishing attack campaign attributed to the China-based Smishing Triad employs malicious iMessages. A large text-message phishing attack…
Google says it recently fixed an authentication weakness that allowed crooks to circumvent the email verification required to create a…
The campaign is laser-targeted, bucking the trend of “spray-and-pray” malicious open source packages turning up in code repositories seemingly every…