-
Threat Brief: Escalation of Cyber Risk Related to Iran
Source: Unit 42 Published on 2025-06-26 By Unit 42
-
Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector
Source: Unit 42 Published on 2025-06-25 By Tom Fakterman and Guy Levi
-
Resurgence of the Prometei Botnet
Source: Unit 42 Published on 2025-06-20 By Lee Wei Yeong and Pranay Kumar Chhaparwal
-
Exploring a New KimJongRAT Stealer Variant and Its PowerShell Implementation
Source: Unit 42 Published on 2025-06-17 By Dominik Reichel
-
Serverless Tokens in the Cloud: Exploitation and Detections
Source: Unit 42 Published on 2025-06-13 By Zohar Zigdon
-
Cyber Criminals Exploit Open-Source Tools to Compromise Financial Institutions Across Africa
Source: The Hacker News Published on 2025-06-26
-
CISA Adds 3 Flaws to KEV Catalog, Impacting AMI MegaRAC, D-Link, Fortinet
Source: The Hacker News Published on 2025-06-26
-
WhatsApp Adds AI-Powered Message Summaries for Faster Chat Previews
Source: The Hacker News Published on 2025-06-26
-
nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery
Source: The Hacker News Published on 2025-06-26
-
Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC
Source: The Hacker News Published on 2025-06-25
-
CISA: AMI MegaRAC bug enabling server hijacks exploited in attacks
Source: BleepingComputer Published on 2025-06-26 By Sergiu Gatlan
-
Hacker 'IntelBroker' charged in US for global data theft breaches
Source: BleepingComputer Published on 2025-06-26 By Lawrence Abrams
-
Hackers turn ScreenConnect into malware using Authenticode stuffing
Source: BleepingComputer Published on 2025-06-26 By Lawrence Abrams
-
Hackers abuse Microsoft ClickOnce and AWS services for stealthy attacks
Source: BleepingComputer Published on 2025-06-26 By Ionut Ilascu
-
New wave of ‘fake interviews’ use 35 npm packages to spread malware
Source: BleepingComputer Published on 2025-06-26 By Bill Toulas
-
AI and collaboration tools: how cyberattackers are targeting SMBs in 2025
Source: Securelist Published on 2025-06-25 By Kaspersky
-
SparkKitty, SparkCat’s little brother: A new Trojan spy found in the App Store and Google Play
Source: Securelist Published on 2025-06-23 By Sergey Puzan, Dmitry Kalinin
-
Toxic trend: Another malware threat targets DeepSeek
Source: Securelist Published on 2025-06-11 By Lisandro Ubiedo
-
Sleep with one eye open: how Librarian Ghouls steal data by night
Source: Securelist Published on 2025-06-09 By Kaspersky
-
Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721
Source: Securelist Published on 2025-06-06 By Anderson Leite
-
Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware
Source: The DFIR Report Published on 2025-05-19 By editor
-
Navigating Through The Fog
Source: The DFIR Report Published on 2025-04-28 By editor
-
Fake Zoom Ends in BlackSuit Ransomware
Source: The DFIR Report Published on 2025-03-31 By editor
-
Confluence Exploit Leads to LockBit Ransomware
Source: The DFIR Report Published on 2025-02-24 By editor
-
Cobalt Strike and a Pair of SOCKS Lead to LockBit Ransomware
Source: The DFIR Report Published on 2025-01-27 By editor
-
Microsoft Named a Leader in the 2025 IDC CNAPP MarketScape: Key Takeaways for Security Buyers
Source: Blog from Microsoft Security Published on 2025-06-26 By Mona Thaker
-
Microsoft is named a Leader in The Forrester Wave™: Security Analytics Platforms, 2025
Source: Blog from Microsoft Security Published on 2025-06-25 By Rob Lefferts
-
Navigating cyber risks with Microsoft Security Exposure Management eBook
Source: Blog from Microsoft Security Published on 2025-06-24 By Linh Hoang
-
Data Breach Reporting for regulatory requirements with Microsoft Data Security Investigations
Source: Blog from Microsoft Security Published on 2025-06-19 By Steve Vandenberg
-
Cyber resilience begins before the crisis
Source: Blog from Microsoft Security Published on 2025-06-13 By Ann Johnson