News

New samples of DCHSpy, a spyware implant linked to Iranian APT group MuddyWater, have been detected by Lookout ...
An investigation has revealed novel scams using tools like MaisonReceipts, creating realistic fake receipts to resell stolen ...
An attack on a US accounting firm delivered PureRAT via Ghost Crypt, involving social engineering and advanced obfuscation ...
On-prem SharePoint customers have been told to assume compromise, with attackers observed to be exfiltrating data from victim ...
Learn how ISO 42001 empowers organizations to manage evolving AI risks while ensuring cybersecurity and data privacy ...
The US Cybersecurity and Infrastructure Security Agency (CISA) has released a number of advisories related to vulnerabilities ...
Russian military intelligence-linked hackers are using a new malware called “Authentic Antics” to secretly access Microsoft ...
Ukraine’s CERT-UA has identified a new AI-powered malware, dubbed “LameHug,” which executes commands on compromised Windows ...
As connected technologies take on more critical functions – from managing power grids and hospitals to transport networks and industrial sites – the boundary between cyber and physical risk is ...
According to the CEH Hall of Fame 2025 Industry Report , 100% of CEH Hall of Fame inductees attribute their career success ...
A cryptomining botnet active since 2019 has incorporated likely AI-generated Lcryx ransomware into its operations ...
Comparitech found that healthcare ransomware attacks rose 4% in H1 2025, a significantly lower rate than the cross-sector ...