The malware loader ‘Bumblebee’ has broken its two-month vacation with a new campaign that employs new distribution techniques that abuse 4shared WebDAV services. WebDAV (Web Distributed...
An estimated 12,000 Juniper SRX firewalls and EX switches are vulnerable to a fileless remote code execution flaw that attackers can exploit without authentication. In August, Juniper...
The APT36 hacking group, aka ‘Transparent Tribe,’ has been observed using at least three Android apps that mimic YouTube to infect devices with their signature remote access...
With advancing tech, concerns rise over the misuse of large language models like ChatGPT. Recently, an LLM model called “WormGPT” surfaced on underground forums, which is significantly...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign aimed to...
The agency’s 2024 Homeland Threat Assessment notes that the “proliferation of accessible AI” could enable larger-scale cyberattacks against the U.S. A Department of Homeland Security report...
Nine national labs will split $39 million in new federal investment, with projects leveraging cloud-based software and AI systems in cybersecurity for U.S. utility companies. On...
A top Defense Department official described the private sector as “absolutely essential” in implementing the agency’s new cyber strategy. A top Defense Department official said Wednesday...
According to recent reports, a threat actor has compromised the confidential information of 3,200 Airbus vendors. The exposed data includes sensitive details such as names, phone...
The nation’s cyber defense agency wants to play a key role in hardening the broader open source software security ecosystem. The Cybersecurity and Infrastructure Security Agency...