Security researchers found two AI-branded VS Code extensions with 1.5M installs that covertly send source code and files to ...
Weekly cybersecurity recap covering emerging threats, fast-moving attacks, critical flaws, and key security developments you ...
North Korean group Konni uses AI-assisted PowerShell malware and phishing via Google ads and Discord to breach blockchain ...
Indian users face a cyber espionage campaign using tax phishing, Blackmoon malware, and abused SyncFuture TSM tools for ...
AI-powered attacks are evading EDR via steganography, AV abuse, and automation, forcing a shift toward combined NDR and EDR ...
OT cyber incidents commonly start from IT gaps like weak remote access, identity reuse & poor recovery, enabling escalation into operational outages.
A multi-stage phishing campaign targeting Russia abuses GitHub and Dropbox to disable Microsoft Defender and deploy Amnesia ...
AI agents break traditional IAM by enabling delegated access, authorization bypass, and high-risk ownerless organizational ...
CISA added VMware vCenter vulnerability CVE-2024-37079 to its KEV list after confirmed in-the-wild exploitation, urging ...
ESET links Russia-backed Sandworm to a failed December 2025 cyberattack using DynoWiper malware against Poland’s power and renewable energy systems.
Researchers uncovered a two-stage phishing attack stealing email logins to install LogMeIn Resolve RMM for persistent, hidden ...
Experts uncovered a new Osiris ransomware strain that used a custom POORTRY driver in a BYOVD attack to disable security tools & steal data in 2025.