Void Banshee APT Exploits Microsoft Zero-Day in Spear-Phishing Attacks
The threat group used CVE-2024-38112 and a "zombie" version of IE to spread Atlantida Stealer through purported PDF versions of…
The threat group used CVE-2024-38112 and a "zombie" version of IE to spread Atlantida Stealer through purported PDF versions of…
Microsoft says the Scattered Spider cybercrime gang has added Qilin ransomware to its arsenal and is now using it in…
Microsoft has finally fixed a known Outlook issue, confirmed in February, which was triggering incorrect security alerts after installing the…
Unraveling Human Factors in Data Breaches Data spillage is a term used to describe the exposure of sensitive or classified…
Threat actors commonly use Living Off The Land (LOTL) techniques to evade detection. Learn more from Wazuh about how its…
Artificial intelligence is an ever-evolving subject; year by year, its landscape is expanding to different industries, and the outcome of…
Signal is finally tightening its desktop client's security by changing how it stores plain text encryption keys for the data…
Businesses need to find a balance between harnessing the benefits of AI assistants and safeguarding sensitive information — maintaining trust…
Even the NSA leaves bugs in its software. In this case, it's the kind of cross-site issue that regularly slips…
The exploitation of vulnerabilities in Ivanti's software underscores the need for robust cybersecurity measures and proactive response strategies to mitigate…