Posts

Cybersecurity
bg
China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access

China-Linked Silk Typhoon Expands Cyber Attacks to IT S...

The China-linked threat actor behind the zero-day exploitation of security flaws...

Cybersecurity
bg
Defending against USB drive attacks with Wazuh

Defending against USB drive attacks with Wazuh

USB drive attacks constitute a significant cybersecurity risk, taking advantage ...

Cybersecurity
bg
Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America

Dark Caracal Uses Poco RAT to Target Spanish-Speaking E...

The threat actor known as Dark Caracal has been attributed to a campaign that de...

Cybersecurity
bg
Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud

Google Rolls Out AI Scam Detection for Android to Comba...

Google has announced the rollout of artificial intelligence (AI)-powered scam de...

Cybersecurity
bg
Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants

Chinese APT Lotus Panda Targets Governments With New Sa...

The threat actor known as Lotus Panda has been observed targeting government, ma...

Cybersecurity
bg
Identity: The New Cybersecurity Battleground

Identity: The New Cybersecurity Battleground

The rapid adoption of cloud services, SaaS applications, and the shift to remote...

Cybersecurity
bg
Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems

Seven Malicious Go Packages Found Deploying Malware on ...

Cybersecurity researchers are alerting of an ongoing malicious campaign targetin...

Cybersecurity
bg
Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates

Researchers Link CACTUS Ransomware Tactics to Former Bl...

Threat actors deploying the Black Basta and CACTUS ransomware families have been...

Cybersecurity
bg
VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches

VMware Security Flaws Exploited in the Wild—Broadcom Re...

Broadcom has released security updates to address three actively exploited secur...

Cybersecurity
bg
How New AI Agents Will Transform Credential Stuffing Attacks

How New AI Agents Will Transform Credential Stuffing At...

Credential stuffing attacks had a huge impact in 2024, fueled by a vicious circl...

Ce site utilise des cookies pour améliorer votre expérience de navigation. En continuant à utiliser ce site, vous consentez à l'utilisation de cookies. Veuillez consulter notre politique de confidentialité pour plus d'informations sur la façon dont nous traitons vos données.