Over the years, mobile devices like smartphones, tablets, and laptops have been extensively used to get work done, primarily due to these powerful devices facilitating mobility...
A new APT hacking group dubbed Lancefly uses a custom ‘Merdoor’ backdoor malware to target government, aviation, and telecommunication organizations in South and Southeast Asia. The Symantec...
Bridewell’s Cyber Threat Intelligence (CTI) team has discovered previously undetected Ursnif infrastructure used in 2023 campaigns, suggesting that the malware operators have not yet utilized this...
The rapid expansion of the internet has provided an ideal environment for malware to thrive. As more people and organizations connect to the internet, more opportunities...
The Artificial Intelligence race has started since the release of ChatGPT in November 2022. There have been several Artificial Intelligence bots developed by organizations all over the world....
The cybersecurity researchers at Cisco Talos recently affirmed that threat actors are targeting the widely-used Microsoft 365 cloud-based productivity platform through the Greatness phishing platform, and...
QR codes, widely used by legitimate organizations for various purposes, such as advertisements and enforcing parking fees, are also being exploited by scammers for their fraudulent...
The Five Eyes member nations’ cybersecurity and intelligence agencies collaborated to dismantle the infrastructure of the Snake cyber-espionage malware, originally developed by Russia’s FSB, which had...
Snake malware has plagued international digital networks for nearly two decades; a joint federal effort finally dismantled the web of espionage spyware. The Department of Justice...
Data theft is the act of stealing data stored in business databases, endpoints, and servers. The stolen data can include credentials, credit card numbers, personal identifiable...