UAC-0247 Targets Ukrainian Clinics and Government in Data-Theft Malware Campaign
Ravie LakshmananApr 16, 2026Malware / Threat Intelligence The Computer Emergencies Response Team of Ukraine (CERT-UA) has disclosed details of a new campaign...
Ravie LakshmananApr 16, 2026Malware / Threat Intelligence The Computer Emergencies Response Team of Ukraine (CERT-UA) has disclosed details of a new campaign...
Opening the wrong PDF in Adobe Reader was enough to let criminals quietly spy on your computer and unleash more...
Ravie LakshmananApr 01, 2026Email Security / Artificial Intelligence The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of...
Ravie LakshmananMar 14, 2026Artificial Intelligence / Endpoint Security China's National Computer Network Emergency Response Technical Team (CNCERT) has issued a...
AI-based assistants or “agents” — autonomous programs that have access to the user’s computer, files, online services and can automate...
AI-based assistants or “agents” — autonomous programs that have access to the user’s computer, files, online services and can...
Image: Clint Patterson/Unsplash You’d think “turning it off and on again” would be the solution to a computer glitch. But...
Crypto Mining Crypto mining is the process by which individuals or organizations use computer power to solve complex mathematical problems,...
Crypto Mining Crypto mining is the process by which individuals or organizations use computer power to solve complex mathematical problems,...
Ravie LakshmananJan 31, 2026Network Security / SCADA CERT Polska, the Polish computer emergency response team, revealed that coordinated cyber attacks...