‘Elusive Comet’ Attackers Use Zoom to Swindle Victims

The threat actor uses sophisticated social engineering techniques to infect…

Nation-State Threats Put SMBs in Their Sights

Cyberthreat groups increasingly see small and medium-sized businesses, especially those…

Nation-State Threats Put SMBs in Their Sights

Cyberthreat groups increasingly see small and medium businesses, especially those…

Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan

Cybersecurity researchers have flagged a new malicious campaign related to…

Akira Ransomware Launches New Cyberattacks Using Stolen Credentials and Public Tools

The Akira ransomware group has intensified its operations, targeting over…

Hackers Leveraging x86-64 Binaries on Apple Silicon to Deploy macOS Malware

Advanced threat actors increasingly leverage x86-64 binaries and Apple’s Rosetta…

Critical Ingress NGINX Controller Vulnerability Allows RCE Without Authentication

A set of five critical security shortcomings have been disclosed…

Windows Active Directory Domain Vulnerability Let Attackers Escalate Privileges

Microsoft has disclosed a significant security vulnerability in Active Directory…

DeepSeek Generating Fully Working Keyloggers & Data Exfiltration Tools

Security researchers at Unit 42 have successfully prompted DeepSeek, a…

OpenAI Operator Agent Used in Proof-of-Concept Phishing Attack

Researchers from Symantec showed how OpenAI's Operator agent, currently in…