Why Threat-Led Defense & Adversary Behavior Are Driving Security Priorities
Security teams used to set priorities based on vulnerabilities and assets. They would monitor CVE feeds, build patch schedules, and...
Security teams used to set priorities based on vulnerabilities and assets. They would monitor CVE feeds, build patch schedules, and...
FBI alerts public to spoofed IC3 site used in fraud schemes Pierluigi Paganini September 22, 2025 The FBI warns that...
Artificial intelligence (AI) systems are increasingly being used within businesses to help in the creation, management, and operation of payment...
Hackers breached Salesloft ’s GitHub in March, and used stole tokens in a mass attack Pierluigi Paganini September 08, 2025...
SVG files used in hidden malware campaign impersonating Colombian authorities Pierluigi Paganini September 05, 2025 VirusTotal uncovered an undetected malware...
The recent mass-theft of authentication tokens from Salesloft, whose AI chatbot is used by a broad swath of corporate America...
The recent mass-theft of authentication tokens from Salesloft, whose AI chatbot is used by a broad swath of corporate America...
Cybersecurity researchers have discovered a new phishing campaign that's being used to distribute malware called Horabot targeting Windows users in...
Russia-linked ColdRiver used LostKeys malware in recent attacks Pierluigi Paganini May 09, 2025 Since early 2025, Russia-linked ColdRiver has used...
GlobalX Airlines, a charter airline being used by the US government for deportation flights, has been attacked by hacktivists who...
Managing SSL certificates used to be tedious and manual, but not anymore. With Sectigo’s Certificate as a Service (CaaS), partners...
The malware loader known as MintsLoader has been used to deliver a PowerShell-based remote access trojan called GhostWeaver. "MintsLoader operates...
Toronto, Canada, Apr. 28, 2025, CyberNewswire — Windscribe, a globally used privacy-first VPN service, announced today that its founder, Yegor...
Research Trends have detected various IP address ranges in Russia employed for cyber criminality in collaboration with North Korea. These...
Evilginx, a tool based on the authentic (and widely utilized) open-source nginx web server, can be utilized to grab usernames,...