Security expert spotted a new piece of malware that leverages weaponized Word documents to download a PowerShell script from GitHub. Security expert discovered a new piece of...
Cybersecurity is an arms race, with defensive tools and training pushing threat actors to adopt even more sophisticated and evasive intrusion techniques as they attempt to...
Open-source software repositories form the backbone of many software development projects. But, what if they are used for planting malicious intents? Over the past few years,...
During a routine Dark web monitoring, the Research team at Cyble found threat actors selling 200 million+ Records of Chinese Citizens. During a routine Dark web monitoring, the...
A PayPal text message phishing campaign is underway that attempts to steal your account credentials and other sensitive information that can be used for identity theft....
Russian hackers stagedtheir attacks from servers inside the U.S. — sometimes using computers in the same town or city as the victims, cybersecurity company FireEye tells...
To close out the year, U.S. telecommunications giant T-Mobile announced it had been hacked. In a notice, the company said its cybersecurity team had discovered and shut down malicious,...
Here are the news and updates you may have missed. Microsoft urged defenders to activate the most restrictive access settings possible while revealing that perpetrators of...
The SolarWinds hackers accessed portions of Microsoft’s source code, the software giant admitted last week. The latest results of an ongoing investigation by Microsoft revealed that the sophisticated...
A security incident at T-Mobile has resulted in customer call data being accessed, the telecommunications giant has said. The hack, which was first reported on December 29, affected...