‘Fog’ Hackers Troll Victims With DOGE Ransom Notes

Since January, threat actors distributing the malware have notched up…

‘Elusive Comet’ Attackers Use Zoom to Swindle Victims

The threat actor uses sophisticated social engineering techniques to infect…

Nation-State Threats Put SMBs in Their Sights

Cyberthreat groups increasingly see small and medium-sized businesses, especially those…

Nation-State Threats Put SMBs in Their Sights

Cyberthreat groups increasingly see small and medium businesses, especially those…

Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan

Cybersecurity researchers have flagged a new malicious campaign related to…

SuperBlack Actors Exploiting Two Fortinet Vulnerabilities to Deploy Ransomware

Between late January and early March 2025, cybersecurity researchers at…

BSI veröffentlicht neue Sicherheitsanforderungen für Datenbanksysteme

Die neuen BSI-Anforderungen gelten sowohl für relationale als auch NoSQL-Datenbanksysteme…

North Korea’s ScarCruft Deploys KoSpy Malware, Spying on Android Users via Fake Utility Apps

The North Korea-linked threat actor known as ScarCruft is said…

Uncategorized

DeepSeek R1: The Revolutionary AI Model Disrupting Global Analytics and Transforming Industries

In the fast-evolving landscape of artificial intelligence (AI), few innovations…

ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading

Cybersecurity researchers have discovered a new, sophisticated remote access trojan…