APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures

The Russian state-sponsored threat actor known as APT29 has been…

Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems

Cybersecurity researchers have uncovered three malicious packages in the npm…

Chinese Hackers Exploit Ivanti Connect Secure Flaw to Gain Unauthorized Access

In a sophisticated cyber-espionage operation, a group known as UNC5221,…

10 Best Cloud Security Solutions 2025

In today’s digital era, businesses are increasingly adopting cloud computing…

10 Best Patch Management Tools 2025

In today’s digital landscape, maintaining secure and efficient IT systems…

Armis Acquires OTORIO to Expand OT Exposure Management Platform

Armis will integrate OTORIO’s Titan platform with its cloud-based Centrix,…

Microsoft Warns of Tax-Themed Email Attacks Using PDFs and QR Codes to Deliver Malware

Microsoft is warning of several phishing campaigns that are leveraging…

Visibility, Monitoring Key to Enterprise Endpoint Strategy

A successful enterprise security defense requires a successful endpoint security…

Man-in-the-Middle Vulns Provide New Research Opportunities for Car Security

A pair of researchers plan on detailing effective tools to…

North Korean Hackers Deploy BeaverTail Malware via 11 Malicious npm Packages

The North Korean threat actors behind the ongoing Contagious Interview…