Philippines Pummeled by Assortment of Cyberattacks & Misinformation Tied to China
The volume of malicious cyber activity against the Philippines quadrupled in the first quarter of 2024 compared to the same…
The volume of malicious cyber activity against the Philippines quadrupled in the first quarter of 2024 compared to the same…
A new campaign tracked as "Dev Popper" is targeting software developers with fake job interviews in an attempt to trick…
Recent trends in breaches and attack methods offer a valuable road map to cybersecurity professionals tasked with detecting and preventing…
Hackers can influence voters with media and breach campaigns, or try tampering with votes. Or they can combine these tactics…
Researchers have sinkholed a command and control server for a variant of the PlugX malware and observed in six months…
Cisco warned today that a state-backed hacking group has been exploiting two zero-day vulnerabilities in Adaptive Security Appliance (ASA) and…
The Treasury Department's Office of Foreign Assets Control (OFAC) has sanctioned four Iranian nationals for their involvement in cyberattacks against…
The threat actor is deploying multiple connections into victim environments to maintain persistence and steal data.
Microsoft warns that the Russian APT28 threat group exploits a Windows Print Spooler vulnerability to escalate privileges and steal credentials…
BleepingComputer recently reported how a GitHub flaw, or possibly a design decision, is being abused by threat actors to distribute malware using…