MS Teams Guest Access Can Remove Defender Protection When Users Join External Tenants
Nov 28, 2025Ravie LakshmananEmail Security / Enterprise Security Cybersecurity researchers have shed light on a cross-tenant blind spot that allows...
Nov 28, 2025Ravie LakshmananEmail Security / Enterprise Security Cybersecurity researchers have shed light on a cross-tenant blind spot that allows...
Cybersecurity researchers have shed light on two different Android trojans called BankBot-YNRK and DeliveryRAT that are capable of harvesting sensitive...
Cybersecurity researchers have shed light on a cybercriminal group called Jingle Thief that has been observed targeting cloud environments associated...
Oct 21, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have shed light on the inner workings of a botnet malware called...
Oct 18, 2025Ravie LakshmananThreat Intelligence / Cybercrime Cybersecurity researchers have shed light on a new campaign that has likely targeted...
Oct 14, 2025Ravie LakshmananMalware / Social Engineering Cybersecurity researchers have shed light on a previously undocumented threat actor called TA585...
Running a SOC often feels like drowning in alerts. Every morning, dashboards light up with thousands of signals; some urgent,...
Cybersecurity researchers have shed light on a new malware campaign that makes use of a PowerShell-based shellcode loader to deploy...
Cybersecurity researchers have shed light on a new campaign targeting WordPress sites that disguises the malware as a security plugin....
Experts in the field of cybersecurity have revealed details about a "self-replicating" botnet designed for mining cryptocurrencies called Outlaw (also...
Recent findings from cybersecurity experts have revealed a fresh threat group associated with China identified as Earth Alux. This group...
It has been revealed by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) that a fresh malware known as RESURGE...
Security analysts have revealed a recent phishing scheme known as PhaaS which exploits the DNS mail exchange (MX) records to...
Researchers specializing in detecting threats have provided additional information about a previously exposed malicious operation carried out by the China-affiliated...
The investigators have illuminated an earlier revealed malicious campaign carried out by the China-associated MirrorFace cyber threat group, which aimed...