A PhaaS platform, dubbed 'Morphing Meerkat,' uses DNS MX records to spoof over 100 brands and steal credentials, according to ...
Expert speakers discussed the impact of reported cutbacks to CISA on the ability of local officials to protect against ...
Once considered inactive, the Chinese cyber espionage group FamousSparrow has reemerged, targeting organizations across the ...
Threat actors are exploiting cloud platforms like Adobe and Dropbox to evade email gateways and steal credentials ...
Unlike previous versions of PJobRAT, which included WhatsApp message-stealing functionality, the latest iteration has shifted ...
The UK’s National Cyber Security Centre (NCSC) has published new guidance designed to minimize malicious domain registrations ...
Newly identified CoffeeLoader uses multiple evasion techniques and persistence mechanisms to deploy payloads and bypass ...
A newly discovered malware campaign uses malicious npm packages to deploy reverse shells, compromising development ...
The ICO’s Deputy Commissioner told Infosecurity that organizations that fail to implement MFA and suffer a breach can expect ...
McAfee researchers have identified a new wave of Android malware campaigns leveraging .NET MAUI to steal sensitive user ...
Forescout researchers found multiple vulnerabilities in leading solar power system manufacturers, which could be exploited to ...
British law enforcers are making some inroads into the problem. Last week they announced 422 arrests, the seizure of £7.5m in ...