‘Elusive Comet’ Attackers Use Zoom to Swindle Victims

The threat actor uses sophisticated social engineering techniques to infect…

Nation-State Threats Put SMBs in Their Sights

Cyberthreat groups increasingly see small and medium-sized businesses, especially those…

Nation-State Threats Put SMBs in Their Sights

Cyberthreat groups increasingly see small and medium businesses, especially those…

Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan

Cybersecurity researchers have flagged a new malicious campaign related to…

Akira Ransomware Launches New Cyberattacks Using Stolen Credentials and Public Tools

The Akira ransomware group has intensified its operations, targeting over…

China-Backed Threat Actor ‘UNC5174’ Using Open Source Tools in Stealthy Attacks

Sysdig researchers detailed an ongoing campaign from China-backed threat actor…

Critical Apache Tomcat RCE Vulnerability Exploited in Just 30hrs of Public Exploit

Security researchers have confirmed that a critical remote code execution…

Evilginx Tool (Still) Bypasses MFA

Based on the open source NGINX Web server, the malicious…

Safe{Wallet} Confirms North Korean TraderTraitor Hackers Stole $1.5 Billion in Bybit Heist

Safe{Wallet} has revealed that the cybersecurity incident that led to…

Galaxy S24 Vulnerability Poses Risk of Unauthorized File Access

A security flaw in Samsung’s Quick Share feature for the…