Digital Identities Have Evolved — Cyber Strategies Should Too
The scale of identity exposure has increased significantly, with over 90% of surveyed organizations reporting an identity-related breach within the last year.…
The scale of identity exposure has increased significantly, with over 90% of surveyed organizations reporting an identity-related breach within the last year.…
After an extended period underground, the Chinese hackers have added a more sophisticated infection chain and additional EDR evasion techniques.
The group — which has targeted Israel, Saudi Arabia, and other nations — often uses spear phishing and legitimate remote…
The threat group used CVE-2024-38112 and a "zombie" version of IE to spread Atlantida Stealer through purported PDF versions of…
A new threat actor known as CRYSTALRAY has significantly broadened its targeting scope with new tactics and exploits, now counting…
The latest variants of the ViperSoftX info-stealing malware use the common language runtime (CLR) to load and execute PowerShell commands…
Fake IT support sites promote malicious PowerShell "fixes" for common Windows errors, like the 0x80070643 error, to infect devices with information-stealing…
A threat actor tracked as Unfurling Hemlock has been infecting target systems with up to ten pieces of malware at the…
Government ministries keep falling victim to relatively standard-fare cyber-espionage attacks, like this latest campaign with hazy Chinese links.
A new malware distribution campaign uses fake Google Chrome, Word, and OneDrive errors to trick users into running malicious PowerShell…