There has been a recent surge in physical letter phishing attacks targeting users of Trezor and Ledger, two renowned cryptocurrency hardware wallet manufacturers. These threat actors...
One Threat Actor Responsible for 83% of Recent Ivanti RCE Attacks Recent threat intelligence indicates that a single threat actor is behind the majority of active...
Reports indicate that state-sponsored hackers have been utilizing Google’s Gemini AI model at various stages of cyber attacks, ranging from initial reconnaissance to post-compromise activities. Hackers...
The Abuse of Employee Monitoring Software for Ransomware Deployment Recent incidents have revealed a concerning trend where threat actors, specifically a member of the Crazy ransomware...
A New Tool Blocks Imposter Attacks Disguised as Safe Commands In the realm of cybersecurity, a groundbreaking open-source and cross-platform tool known as Tirith has emerged....
In today’s digital landscape, the browser has become the central hub for enterprise work. With a multitude of SaaS applications, identity providers, admin consoles, and AI...
Russian Hackers Exploit Recently Patched Microsoft Office Bug Reports from Ukraine’s Computer Emergency Response Team (CERT) reveal that Russian hackers are taking advantage of CVE-2026-21509, a...
Browser-based attacks are a significant threat that many organizations face, with 95% of enterprises experiencing such attacks last year. These attacks often go unnoticed by traditional...
When it comes to cybersecurity, one thing remains constant: adversaries are always evolving. The emergence of offensive AI is revolutionizing attack techniques, making them more difficult...
The Rise of Voice Phishing Attacks Targeting SSO Accounts In recent times, the ShinyHunters extortion gang has claimed responsibility for a series of voice phishing attacks...
Subscribe to our weekly newsletter below and never miss the latest News or an exclusive offer.