In the past, the bulletproof group has been affiliated with many well-known ransomware and malware groups, such as BianLian and Lumma Stealer. Read More
Analyzing binary code helps vendors and organizations detect security threats and zero-day vulnerabilities in the software supply chain, but it doesn't come without challenges. It looks like AI has come…
You might think your security stack has things covered. But some threats are built specifically to slip through it quietly, without raising a single flag. They don’t explode on arrival.…
A new threat vector exploits how modern browsers save HTML files, bypassing Mark of the Web and giving attackers another social-engineering attack for delivering malware. Read More
Cybercriminals have intensified their assault on poorly managed Linux SSH servers, deploying sophisticated proxy tools to establish covert network infrastructure. These attacks represent a shift from traditional malware deployment toward…
Threat actors with ties to North Korea have been observed targeting Web3 and cryptocurrency-related businesses with malware written in the Nim programming language, underscoring a constant evolution of their tactics.
"Unusually for macOS malware, the threat actors employ a process injection technique and remote communications via wss, the TLS-encrypted version of the WebSocket protocol,"
A newly discovered denial-of-service vulnerability in the ModSecurity Web Application Firewall (WAF) engine has security experts on high alert. The flaw, designated CVE-2025-52891, affects specific versions of mod_security2 and can be triggered by…
The digital landscape is experiencing a fundamental transformation as artificial intelligence crawlers emerge as dominant forces across the global internet infrastructure. Recent analysis reveals that automated bots now account for…
Microsoft is strengthening its cybersecurity arsenal with the introduction of Mail Bombing Detection in Microsoft Defender for Office 365, a sophisticated feature designed to combat the growing threat of email…
The ever-growing volume of vulnerabilities and threats requires organizations to remain resilient and anti-fragile — that is, to be able to proactively respond to issues and continuously improve. Read More
The International Criminal Court (ICC) has successfully detected and contained a sophisticated cybersecurity incident that targeted the judicial institution late last week. This marks the second major cyber attack of…
[[{"value":"Ransomware is a major threat to the enterprise. Tools and training help, but survival depends on one thing: your organization’s muscle memory to respond fast and recover stronger. The post…
CISA has issued an urgent warning regarding two critical vulnerabilities in TeleMessage TM SGNL that threat actors are currently exploiting in active attack campaigns. The vulnerabilities, tracked as CVE-2025-48927 and…
Microsoft has announced significant modifications to its popular Authenticator application, with critical features being discontinued in the coming months. Starting July 2025, the autofill functionality within Microsoft Authenticator will cease…