New ‘OtterCookie’ malware used to backdoor devs in fake job offers
North Korean threat actors are using new malware called OtterCookie in the Contagious Interview campaign that is targeting software developers.…
North Korean threat actors are using new malware called OtterCookie in the Contagious Interview campaign that is targeting software developers.…
From zero-day exploits to 5G network vulnerabilities, these are the threats that are expected to persist over the next 12…
As organizations on the continent expand their use of digital technologies, they increasingly face many of the same threats that…
Liberal outlets offered advice on "Trump-proofing" Christmas, from canceling holidays altogether to awkward scripts for family talks, sparking debate over…
The North Korean hacker group 'TraderTraitor' stole $308 million worth of cryptocurrency in the attack on the Japanese exchange DMM Bitcoin…
Since October 2023, cyberattacks among countries in the Middle East have persisted, fueled by the conflict between Israel and Hamas,…
Three popular npm packages, @rspack/core, @rspack/cli, and Vant, were compromised through stolen npm account tokens, allowing threat actors to publish…
While a number of threat groups have used TP-Link bugs to infiltrate networks, a proposed ban of the company's popular…
Sophos has addressed three vulnerabilities in its Sophos Firewall product that could allow remote unauthenticated threat actors to perform SQL…
Combating nation-state threat actors at the enterprise level requires more than just cyber readiness and investment — it calls for…