News

Authorities from the United Kingdom, the Netherlands, and Europol joined forces to dismantle JokerOTP, a ...
Machine learning-powered security systems should be used as a tool, not as a replacement for security teams for web apps.
New research from Barracuda has revealed that a staggering 23% of HTML attachments are marked as malicious, making HTML the ...
Cybercriminals also likely to leverage tools present within the targeted environment rather than to construct new malware or ...
The use of personal devices for work purposes, often referred to as ‘Bring Your Own Device’ (BYOD), can lead to data breaches ...
The 18th installment of the DBIR surveyed 22,052 total cyber attacks logged by Verizon's internal threat research team, over half of which (12,195) involved confirmed data breaches. Credential abuse ...
To develop the findings in this year's report, Zimperium analyzed anonymized data from mobile devices protected by its Mobile Threat Defense solution and applications scanned by its app analysis ...
Members of the World Uyghur Congress living in exile were targeted with a spear phishing campaign deploying surveillance malware, according to the Citizen Lab ...
Cybercriminals are targeting WooCommerce users with fake patch emails that use IDN homograph spoofing to deliver backdoor malware.
A new cyberattack is targeting Microsoft 365 users through Signal and WhatsApp messages, with hackers impersonating ...
As generative AI tools become more accessible, threat actors are using GPTs to launch increasingly sophisticated and scalable ...
Mandiant’s M-Trends 2025 reveals emerging cybersecurity threats, from stolen credentials to state-backed insider risks.