CPUID API Compromised, Distributing Malware via CPU-Z and HWMonitor Downloads Hackers recently infiltrated an API linked to the CPUID project, leading to a significant security breach....
International Law Enforcement Action Identifies Over 20,000 Victims of Cryptocurrency Fraud An extensive international law enforcement operation, spearheaded by the U.K.’s National Crime Agency (NCA), has...
The Targeted Attack Surface of Iranian-Linked Hackers on U.S. Critical Infrastructure Iranian-linked hackers have set their sights on U.S. critical infrastructure networks, particularly targeting Internet-exposed programmable...
OpenAI recently introduced a new Pro subscription priced at $100, aligning with Claude’s subscription model, which also offers a $100 plan alongside a $200 Max monthly...
into plain text. Organizations are advised to prioritize FIDO2 hardware keys for high-risk roles, monitor live chat for suspicious links, and regularly audit newly enrolled MFA...
The Evolution of Cybersecurity: Adapting to Autonomous AI Threats Author: Saeed Abbasi, Senior Manager, Threat Research Unit, Qualys Embracing Change in Cybersecurity Defense As Time-to-Exploit plunges...
New ‘LucidRook’ Malware Targeting NGOs and Universities A recently discovered Lua-based malware known as LucidRook is currently being utilized in spear-phishing campaigns aimed at non-governmental organizations...
into plain text. Organizations are advised to prioritize FIDO2 hardware keys for high-risk roles, monitor live chat for suspicious links, and regularly audit newly enrolled MFA...
New VENOM Phishing Attacks Targeting Senior Executives’ Microsoft Logins Recent reports have highlighted a concerning trend in the cybersecurity landscape, with threat actors utilizing a sophisticated...
The Impact of a Massive Email Data Breach on Authentication Security A recent breach at Figure, a financial services company, resulted in the exposure of nearly...
Subscribe to our weekly newsletter below and never miss the latest News or an exclusive offer.