Threat actors are abusing Velociraptor, an open-source digital forensics and incident response (DFIR) tool, in connection ...
Huntress reports widespread SonicWall VPN compromises and Akira ransomware exploits amid firewall backup leaks.
Huntress reports active exploitation of Gladinet CVE-2025-11371, exposing system files and enabling remote code execution.
Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm registry that have been used to ...
The SOC of 2026 will no longer be a human-only battlefield. As organizations scale and threats evolve in sophistication and ...
Fortinet warns Stealit malware uses Node.js SEA and fake installers to deliver stealers, RATs, and persistence.
CVE-2025-10035 concerns a case of deserialization vulnerability in the License Servlet that could result in command injection ...
The use of a large language model (LLM) to augment its operations is evidenced in the fabrications prevalent in the phishing ...
"Storm-2657 is actively targeting a range of U.S.-based organizations, particularly employees in sectors like higher ...
LayerX finds AI tools now drive most enterprise data leaks, with 77% of sensitive data pasted via personal accounts.
A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia using a mix of Telegram channels and ...
Russian hackers' adoption of artificial intelligence (AI) in cyber attacks against Ukraine has reached a new level in the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results