News
An executive compromised through a family-targeted scam can quickly lead to broader breaches in corporate security.
Cyber attribution and threat actor naming conventions have sparked long-lasting debates in cyber spheres, at least since ...
Cyber-attacks using HijackLoader and DeerStealer have been identified exploiting phishing tactics via ClickFix ...
A half-day workshop is scheduled for June 19. The workshop will focus on findings from the Turing Institute’s Cyber Threat ...
Microsoft (MSFT) and CrowdStrike (CRWD) are collaborating to bring coordination to how cyber threat actors are identified and tracked across security vendors.
Threats will only continue to become more complex as new technologies advance. According to a 2024 Microsoft report, its threat intelligence department now tracks “more than 1,500 unique threat groups ...
Palo Alto Networks and Google and its Mandiant unit have also agreed to join the collaborative effort on streamlining threat group taxonomy. For years, the companies’ different naming conventions for ...
Microsoft chair Brad Smith outlines an expansive cyber programme targeting governments across Europe with enhanced threat ...
The company's new report outlines the latest examples of AI misuse and abuse originating from China and elsewhere.
Microsoft and CrowdStrike have announced that they are working together to solve one of cybersecurity’s most persistent ...
Compliance-focused cybersecurity is not enough to stop threat actors who are lying in wait to initiate destructive attacks.
OpenAI’s June 2025 report details 10 threats from six countries, including propaganda bots, fake resumes, and Windows-based ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results