Muddling Meerkat hackers manipulate DNS using China’s Great Firewall
A new cluster of activity tracked as "Muddling Meerkat" is believed to be linked to a Chinese state-sponsored threat actor's manipulation…
A new cluster of activity tracked as "Muddling Meerkat" is believed to be linked to a Chinese state-sponsored threat actor's manipulation…
The FBI is warning of fake verification schemes promoted by fraudsters on online dating platforms that lead to costly recurring subscription charges. [...]
PRESS RELEASE McLean, Va. & Bedford, Mass., April 25, 2024 — MITRE’s Cyber Resiliency Engineering...
A new campaign tracked as "Dev Popper" is targeting software developers with fake job interviews in an attempt to trick…
By Alex Serdiuk, CEO, Respeecher Newer and more impactful technological advancements are making the quest for foolproof cybersecurity measures more…
Recent trends in breaches and attack methods offer a valuable road map to cybersecurity professionals tasked with detecting and preventing…
Hackers can influence voters with media and breach campaigns, or try tampering with votes. Or they can combine these tactics…
PRESS RELEASE Tampa Bay, FL (April 24, 2024) – KnowBe4, the provider of the world’s largest...
A threat actor has been using a content delivery network cache to store information-stealing malware in an ongoing campaign targeting…
Thanks to AI, phishing attacks are better than ever. So is our ability to stop them. By Antonio Sanchez, Principal…