One Threat Actor Responsible for 83% of Recent Ivanti RCE Attacks Recent threat intelligence indicates that a single threat actor is behind the majority of active...
into plain text. Cryptocurrency Exchanges Targeted A recent surge in attacks targeting cryptocurrency exchanges has been observed, with threat actors using a combination of phishing and...
Fake Job Recruiters Conceal Malware in Developer Coding Challenges An emerging trend in the realm of cyber threats involves North Korean actors targeting JavaScript and Python...
Malicious Campaign Exploiting Claude Artifacts to Target macOS Users Recently, threat actors have been leveraging Claude artifacts and Google Ads in ClickFix campaigns to distribute infostealer...
Microsoft Configuration Manager Vulnerability Exploited by Cyber Attackers The Cybersecurity and Infrastructure Security Agency (CISA) has issued a directive for U.S. government agencies to protect their...
Introducing Bitwarden’s ‘Cupid Vault’ for Secure Password Sharing Bitwarden has recently unveiled a new feature called ‘Cupid Vault’, designed to facilitate secure password sharing among its...
Russia Attempts to Block WhatsApp and Telegram in Communication Crackdown The Russian government is currently making efforts to restrict access to WhatsApp within the country as...
Romania’s Conpet Confirms Data Theft in Qilin Ransomware Attack Recently, Romania’s national oil pipeline operator, Conpet S.A., fell victim to a cyberattack by the Qilin ransomware...
Reynolds Ransomware: A New Threat with Built-in Defense Evasion Component A recent disclosure by cybersecurity researchers has shed light on a new ransomware strain known as...
Reports indicate that state-sponsored hackers have been utilizing Google’s Gemini AI model at various stages of cyber attacks, ranging from initial reconnaissance to post-compromise activities. Hackers...
Subscribe to our weekly newsletter below and never miss the latest News or an exclusive offer.