This section has all the newest information on a wide range of threats, such as online threats, physical security risks, and new threats. Keep up with the latest changes in attacks, weaknesses, and possible dangers in a variety of areas. Our coverage gives you an idea of how these threats are changing and what you can do to lessen their effects.
Researchers uncovered two previously unknown endpoints with older Cortex XDR agents that used to test an AV/EDR bypass tool were…
Researchers have identified a network of compromised devices, CovertNetwork-1658, used by Chinese threat actors to launch highly evasive password spray…
The researchers have observed consistent efforts by Russia, Iran, and China to exert foreign influence on democratic processes in the…
Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication on cryptocurrency exchanges, which is designed…
In a new campaign that is aimed at users who speak Russian, the modular remote access tool (RAT) known as…
Honeypots, decoy systems, detect and analyze malicious activity by coming in various forms and can be deployed on cloud platforms…
Cluster Bravo, despite its brief initial activity, subsequently targeted 11 organizations in the same region, as researchers found that these…
The Iranian threat actor APT34, also known as GreenBug, has recently launched a new campaign targeting Iraqi government entities by…
Three Chinese state-backed threat groups, APT10, GALLIUM, and Stately Taurus, have repeatedly employed a modified version of the open-source network…
Web3 and DeFi have been appealing to many threat actors, and there has been a significant boost in heists that…