The Cybersecurity and Infrastructure Security Agency has released an updated Malware Analysis Report (MAR) revealing new findings on RESURGE, a highly sophisticated malware implant that exploits ...
Financial institutions struggle to detect crime in global supply chains as criminals use AI while banks rely on manual ...
The economic and societal gains from AI will likely exceed the web and mobile eras combined, writes Google Canada’s ...
Likely Chinese nation-state hackers used online spreadsheets as infrastructure for hacking campaigns that affected at least ...
In a blog post, Google Threat Intelligence Group (GTIG) detailed the malicious activity by UNC2814, a cyber-espionage operation with suspected links to China which has been active since 2017. The ...
Safe coding is a collection of software design practices and patterns that allow for cost-effectively achieving a high degree ...
Noma Security, a provider of AI Security, announced that their comprehensive AI Security platform is now available through the Extended plan in AWS Security Hub, Amazon Web Services' unified security ...
IntroductionIn December 2025, Zscaler ThreatLabz discovered a campaign linked to APT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima), which is a DPRK-backed threat group. In this campaign ...
In an update on the RESURGE malware, CISA claims that the malicious software can remain latent on systems until a remote actor attempts to connect to the compromised device. Because of this, the ...
Hackers exploited CVE-2025-64328, a FreePBX command injection vulnerability, to infect hundreds of instances with web shells.
Over 900 FreePBX systems remain infected after CVE-2025-64328 exploitation, now listed in CISA KEV amid active attacks.
Malicious Packagist Laravel packages install a cross-platform RAT enabling remote shell access and system reconnaissance via ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results