Governments, Telcos Ward Off China’s Hacking Typhoons
Infiltrating other nations' telecom networks is a cornerstone of China's geopolitical strategy, and it's having the unintended consequence of driving…
Infiltrating other nations' telecom networks is a cornerstone of China's geopolitical strategy, and it's having the unintended consequence of driving…
U.S. Senator Ron Wyden of Oregon announced a new bill to secure the networks of American telecommunications companies breached by…
Radiant Capital now says that North Korean threat actors are behind the $50 million cryptocurrency heist that occurred after hackers…
Mandiant has identified a novel method to bypass contemporary browser isolation technology and achieve command-and-control C2 operations. [...]
The popular Ultralytics YOLO11 AI model was compromised in a supply chain attack to deploy cryptominers on devices running versions…
The Termite ransomware gang has officially claimed responsibility for the November breach of software as a service (SaaS) provider Blue…
A large U.S. organization with significant presence in China has been reportedly breached by China-based threat actors who persisted on…
A single barrier prevented attackers from exploiting a critical vulnerability in an enterprise collaboration platform. Now there's a workaround.
U.S. authorities have arrested a 19-year-old teenager linked to the notorious Scattered Spider cybercrime gang who is now charged with…
Chinese state hackers, known as Salt Typhoon, have breached telecommunications companies in dozens of countries, President Biden's deputy national security…