North Korean Konni APT Targets Ukraine with Malware to track Russian Invasion Progress

The North Korea-linked threat actor known as Konni APT has…

Deepfake Defense in the Age of AI

The cybersecurity landscape has been dramatically reshaped by the advent…

IAM 2025: Diese 10 Trends entscheiden über Ihre Sicherheitsstrategie

Die Kernaussage der EIC Conference 2025: IAM ist ein ganzheitlicher…

CISA’s alert pivot reflects a new era of decentralized cyber threat communication

In a move that may redefine how the US government…

Hackers Abuse PyInstaller to Deploy Stealthy macOS Infostealer

Jamf Threat Labs has identified a novel macOS infostealer that…

Gunra Ransomware’s Double‑Extortion Playbook and Global Impact

Gunra Ransomware, has surfaced as a formidable threat in April…

New GPOHound Tool Analyzes Active Directory GPOs for Escalation Risks

Security researchers have released GPOHound, a powerful open-source tool designed to…

43% of Top 100 Enterprise Mobile Apps Expose Sensitive Data to Hackers

A comprehensive study by zLabs, the research team at Zimperium,…

Denmark Warns of Serious Cyber Attacks Targeting Telecommunication Sector

The Danish Agency for Social Security (CFCS) has issued an…

IT Worker from Computacenter Let Girlfriend Into Deutsche Bank’s Restricted Areas

A former information technology manager has filed a whistleblower lawsuit…

China’s Silk Typhoon APT Shifts to IT Supply Chain Attacks

The nation-state threat group has been breaching providers of remote management tools, identity management providers, and other IT companies to access networks of targeted entities, […]