Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware

The China-linked cyber espionage group tracked as Lotus Panda has…

Whistleblower: DOGE Siphoned NLRB Case Data

A security architect with the National Labor Relations Board (NLRB)…

‘Fog’ Hackers Troll Victims With DOGE Ransom Notes

Since January, threat actors distributing the malware have notched up…

‘Elusive Comet’ Attackers Use Zoom to Swindle Victims

The threat actor uses sophisticated social engineering techniques to infect…

Nation-State Threats Put SMBs in Their Sights

Cyberthreat groups increasingly see small and medium-sized businesses, especially those…

Women in CyberSecurity and ISC2 Announce the WiCyS + ISC2 Certified in CybersecuritySM Certification Spring Camp

Post Content ​The original article found on darkreading Read More

Google Unveils A2A Protocol That Enable AI Agents Collaborate to Automate Workflows

Google has announced the launch of Agent2Agent Protocol (A2A), a…

Wave of Wine-Inspired Phishing Attacks Targets EU Diplomats

Russia-backed APT29's latest campaign once again uses malicious invites to…

Over 6 Million Chrome Extensions Found Executing Remote Commands

Security researchers have uncovered a network of over 35 Google…

RSAC Unveils Keynote Speaker Slate for RSAC (TM) 2025 Conference

Post Content ​The original article found on darkreading Read More