An unidentifid attacker hid a malicious binary in a tampered copy of a SonicWall VPN product that would have harvested the details of anyone that installed it. SonicWall published threat research on ...
Microsoft Incident Response investigated an attack operated through legitimate and trusted administrative mechanisms to blend ...
The frequency of cyber-attacks on customer-facing mobile apps has increased rapidly over the past few years, as AI reduces ...
A new report from cyber threat intelligence company Intel471 reveals that threat actors are infiltrating macOS. Intel471’s new report reveals macOS is increasingly targeted by threat actors, who ...
Through the combined efforts between Dinsmore’s cybersecurity team and Armada Growth Partners (AGP), new intelligence on the Techniques, Tactics, and Procedures (TTP) for the Nitrogen ransomware group ...
SAN MATEO, Calif.--(BUSINESS WIRE)--Arkose Labs, the leading global account security company, today announced the release of its new report, A Data-Driven Analysis of Threat Actor Behavior, which ...
Cloudflare, Inc. (NYSE: NET), the leading connectivity cloud company, today published its inaugural 2026 Cloudflare Threat Report. This report draws on the expertise of the Cloudforce One threat ...
Threat Actors Achieve Lateral Movement in as Little as 4 Minutes – ReliaQuest Reports: ‘The Only Way to Fight AI Is With AI’ ReliaQuest, the leader in agentic AI security operations, today released ...
A new report out today from real-time event and risk detection company Dataminr Inc. has found that 2025 marked a structural shift in cyber risk, as threat actor activity surged, identity-based ...
Google Threat Intelligence Group (GTIG) recently reported that cybercriminals—in particular, state-sponsored threat actors from North Korea, Iran, China, and Russia—are misusing Gemini, Google’s large ...
While multiple attackers are now actively exploiting vulnerable on-premises SharePoint servers, Google Cloud-owned Mandiant assesses that ‘at least one’ is based in China. Among the attackers now ...
We collaborate with the world's leading lawyers to deliver news tailored for you. Sign Up for any (or all) of our 25+ Newsletters. Some states have laws and ethical rules regarding solicitation and ...