Threat actors are increasingly mimicking legitimate applications like Skype, Adobe Reader, and VLC Player as a means to abuse trust...
The Hacker News
The Hacker News
The only threat more persistent to organizations than cyber criminals? The cyber security skills crisis. Nearly 60% of enterprises can’t find the...
A new, large-scale phishing campaign has been observed using adversary-in-the-middle (AitM) techniques to get around security protections and compromise enterprise...
Virtualization services provider VMware on Tuesday shipped updates to address 10 security flaws affecting multiple products that could be abused by unauthenticated...
Researchers have disclosed a new offensive framework called Manjusaka that they call a "Chinese sibling of Sliver and Cobalt Strike."...
A threat actor associated with the LockBit 3.0 ransomware-as-a-service (RaaS) operation has been observed abusing the Windows Defender command-line tool...
Researchers have uncovered a list of 3,207 apps, some of which can be utilized to gain unauthorized access to Twitter...
Now more than ever, organizations need to enable their development teams to build and grow their security skills. Today organizations...
A 24-year-old Australian national has been charged for his purported role in the creation and sale of spyware for use...
The operators of the Gootkit access-as-a-service (AaaS) malware have resurfaced with updated techniques to compromise unsuspecting victims. "In the past,...