An active, coordinated exploitation campaign conducted by a botnet has been identified by Check Point Research which...
Uncategorized
Cyber threat actors went all in on credential theft in 2025, with eSentire reporting a 389% year-over-year...
A long-running malvertising campaign is dropping backdoor malware onto the networks of organizations around the world through...
Both cybercriminals and hacktivists have increased cyber-attacks against industrial technology environments, with vulnerability exploits in these systems...
A new set of security principles aimed at protecting operational technology (OT) environments has been released by...
A critical misconfiguration in AWS CodeBuild has allowed attackers to seize control of core AWS GitHub repositories,...
There has been a significant rise in ransomware campaigns which do not rely on encryption as cybercriminal...
A new wave of phishing-led intrusions abusing legitimate remote monitoring and management (RMM) tools has been documented,...
A cybercriminal subscription services responsible for fraud campaigns causing millions of dollars in losses has been disrupted...
A multi-stage Windows malware campaign, tracked as SHADOW#REACTOR, has been analyzed by cybersecurity researchers, revealing a complex...
