The 8 Most Dangerous File Types for Malware Infections
October 14, 2025 Every file your organization touches is a potential threat in disguise. Behind the spreadsheets, contracts, and reports...
October 14, 2025 Every file your organization touches is a potential threat in disguise. Behind the spreadsheets, contracts, and reports...
Google, Mandiant expose malware and zero-day behind Oracle EBS extortion Pierluigi Paganini October 13, 2025 Google and Mandiant link Oracle...
Hackers Behind the Code I recently had the privilege of being a guest on the “Hackers Behind the Code” podcast,...
Understanding the Human Mind Behind the 70% Who Feel Overwhelmed by Password Management Let me start with a story that...
The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their...
EU agency ENISA says ransomware attack behind airport disruptions Pierluigi Paganini September 22, 2025 The EU cybersecurity agency ENISA confirmed...
The bad actors behind the Scattered Lapsus$ Hunters threat group say they are shutting down operations and retiring, but cybersecurity...
UK ICO finds students behind majority of school data breaches Pierluigi Paganini September 15, 2025 UK ICO reports students caused...
The threat actor behind the malware-as-a-service (MaaS) framework and loader called CastleLoader has also developed a remote access trojan known...
Hugging Face has acquired Pollen Robotics, the French company behind the humanoid robot Reachy 2. This acquisition aims to democratize...
Operation Moonlander dismantled the botnet behind Anyproxy and 5socks cybercriminals services Pierluigi Paganini May 10, 2025 Law enforcement dismantled a...
The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of a cross-platform malware...
Polish authorities arrested 4 people behind DDoS-for-hire platforms Pierluigi Paganini May 08, 2025 Polish police arrested 4 people behind DDoS-for-hire...
Hackers with ties to North Korea responsible for the Contagious Interview scheme have established dummy companies as a means to...
The malicious individuals responsible for the Darcula phishing-as-a-service (PhaaS) platform have introduced recent enhancements to their cybercrime lineup featuring generative...