Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware
Ravie LakshmananMar 27, 2026Threat Intelligence / Vulnerability A pro-Ukrainian group called Bearlyfy has been attributed to more than 70 cyber...
Ravie LakshmananMar 27, 2026Threat Intelligence / Vulnerability A pro-Ukrainian group called Bearlyfy has been attributed to more than 70 cyber...
It’s called AirSnitch: Unlike previous Wi-Fi attacks, AirSnitch exploits core features in Layers 1 and 2 and the failure...
When a top cybersecurity firm discovered it had a leak, you would expect the FBI to be called. Instead, the...
Threat hunters have called attention to a new campaign as part of which bad actors masqueraded as fake IT support...
Cybersecurity researchers have disclosed details of a new phishing suite called Starkiller that proxies legitimate login pages to bypass multi-factor...
Cybersecurity researchers have disclosed details of a new botnet loader called Aeternum C2 that uses a blockchain-based command-and-control (C2) infrastructure...
Image: GoldenDayz/Envato A new social network called Moltbook launched in late January with a premise that should unsettle every CISO...
Last year, IDC called firewall policy management a foundation organizations could no longer ignore. This year, the message is...
Red Teaming (also called adversary simulation) is a way to test how strong an organization’s security really is. In...
Image: Nicholas Sutrich/Android Central If you think an app called “Antivirus” means your phone’s safe, think again. Cybercrooks just found...
Cybersecurity researchers have called attention to a "massive campaign" that has systematically targeted cloud native environments to set up malicious...
A new Internet-of-Things (IoT) botnet called Kimwolf has spread to more than 2 million devices, forcing infected systems to participate...
Cybersecurity researchers have disclosed details of a new ransomware family called Osiris that targeted a major food service franchisee operator...