‘Fog’ Hackers Troll Victims With DOGE Ransom Notes

Since January, threat actors distributing the malware have notched up…

‘Elusive Comet’ Attackers Use Zoom to Swindle Victims

The threat actor uses sophisticated social engineering techniques to infect…

Nation-State Threats Put SMBs in Their Sights

Cyberthreat groups increasingly see small and medium-sized businesses, especially those…

Nation-State Threats Put SMBs in Their Sights

Cyberthreat groups increasingly see small and medium businesses, especially those…

Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan

Cybersecurity researchers have flagged a new malicious campaign related to…

Autonomous, GenAI-Driven Attacker Platform Enters the Chat

"Xanthorox AI" provides a modular GenAI platform for offensive cyberattacks,…

As a SOC/DFIR Team Member, How to Analyse Real-Time Linux Malware Network Traffic

Network traffic analysis has emerged as one of the most…

CISA Releases Five Industrial Control Systems Advisories Covering Vulnerabilities & Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) released five Industrial…

Linux USB Audio Driver Vulnerability Let Attackers Execute Arbitrary Code Via Malicious USB Device

A critical vulnerability in the USB-audio driver, which could lead…

FDA’s Critical Role in Keeping Medical Devices Secure

The FDA's regulations and guidance aim to strike a balance…