Google Mandiant tracks FIN11’s high-volume extortion emails exploiting Oracle E-Business Suite, possibly linked to Cl0p.
The ProSpy campaign, discovered in June 2025, is believed to have been ongoing since 2024, leveraging deceptive websites ...
From unpatched cars to hijacked clouds, this week's Threatsday headlines remind us of one thing — no corner of technology is ...
Malicious PyPI package soopsocks downloaded 2,653 times before takedown, exfiltrating Windows data to Discord.
Confucius hackers target Pakistan with WooperStealer and Anondoor malware using phishing and DLL side-loading.
Automated workflows accelerate pentest delivery, cut delays, and ensure real-time vulnerability remediation visibility.
CVE-2025-59363 "allowed attackers with valid API credentials to enumerate and retrieve client secrets for all OIDC ...
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of new targeted cyber attacks in the country using a ...
SGX is designed as a hardware feature in Intel server processors that allows applications to be run in a Trusted Execution ...
Unknown threat actors are abusing Milesight industrial cellular routers to send SMS messages as part of a smishing campaign ...
AI-only workflows risk fragility and compliance issues—learn secure, explainable automation in this Tines webinar.
Phantom Taurus' modus operandi also stands out due to the use of custom-developed tools and techniques rarely observed in the ...