Novel phishing campaign uses corrupted Word documents to evade security
A novel phishing attack abuses Microsoft's Word file recovery feature by sending corrupted Word documents as email attachments, allowing them…
A novel phishing attack abuses Microsoft's Word file recovery feature by sending corrupted Word documents as email attachments, allowing them…
Ben Bankas pondered fascism as he waited for the Cybertruck. His enemies on the left have branded his comedy “right-wing…
Two men have been arrested for allegedly stealing data from and extorting dozens of companies that used the cloud data…
The APT, aka Earth Estries, is one of China's most effective threat actors, performing espionage for sometimes years on end…
Attackers are betting that the hype around generative AI (GenAI) is attracting less technical, less cautious developers who might be…
by Gary S. Miliefsky, CISSP, fmDHS As the publisher of Cyber Defense Magazine, I have a great honor and pleasure…
A hacker responsible for stealing 119,754 Bitcoin in a 2016 hack on the Bitfinex cryptocurrency exchange was sentenced to five…
A financially motivated Chinese threat actor dubbed "SilkSpecter" is using thousands of fake online stores to steal the payment card…
New Glove Stealer information-stealing malware can bypass Google Chrome's Application-Bound (App-Bound) encryption to steal browser cookies. [...]
Robert Purbeck, a 45-year-old man from Idaho, has been sentenced to ten years in prison for hacking at least 19…