As per reports, a new version of the Rilide stealer is known to be stealing credentials from enterprise employees and crypto wallets. This new version is...
The privacy-focused search engine Brave Search has finally introduced its own, independent image and video search capabilities, breaking free from relying on Bing and Google for...
Serco Inc, the Americas division of multinational outsourcing company Serco Group, has disclosed a data breach after attackers stole the personal information of over 10,000 individuals...
Hacktivist groups that operate for political or ideological motives employ a broad range of funding methods to support their operations. Israeli cyber-intelligence firm KELA notes that although hacktivism...
Hackers actively leverage LOLBAS (Living-Off-the-Land Binaries-And-Scripts), it’s a popular methodology that is used by threat actors for exploiting legit tools for hiding the illicit actions performed by them....
Threat actors are evolving their techniques and tools at a rapid pace that is completely changing the current threat scenario. BlueCharlie is a Russia-linked threat group that...
Microsoft Threat intelligence identifies Midnight Blizzard (previously tracked as NOBELIUM) as a highly targeted social engineering attack. The attacker uses compromised Microsoft 365 tenants owned by small...
There is a critical vulnerability in Ivanti’s MobileIron Core 11.2 version that could allow a malicious actor to gain unauthorized access to restricted functions. MobileIron core...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) said today that state hackers have been exploiting two flaws in Ivanti’s Endpoint Manager Mobile (EPMM), formerly MobileIron...
Security researchers are warning of increased phishing activity that abuses Google Accelerated Mobile Pages (AMP) to bypass email security measures and get to inboxes of enterprise...