The scale of identity exposure has increased significantly, with over 90% of surveyed organizations reporting an identity-related breach within the last year.…
Cybersecurity threats continue to grow, with the threat landscape constantly evolving and hackers employing increasingly sophisticated and unpredictable methods. With…
MrBeast’s transgender costar quits massively popular children’s YouTube channel after grooming accusations
Ava Kris Tyson — a biological male born Chris Tyson before transitioning — was a costar of the MrBeast YouTube…
Telegram zero-day allowed sending malicious Android APKs as videos
A Telegram for Android zero-day vulnerability dubbed 'EvilVideo' allowed attackers to send malicious Android APK payloads disguised as video files.…
Chinese Forced-Labor Ring Sponsors Football Clubs, Hides Behind Stealth Tech
An illegal gambling empire fueled by modern-day slavery is being propped up by high-profile sponsorships — and defended with sophisticated…
Digital Identities Have Evolved — Cyber Strategies Should Too
The scale of identity exposure has increased significantly, with over 90% of surveyed organizations reporting an identity-related breach within the last year.…
Buggy CrowdStrike EDR Update Crashes Windows Systems Worldwide
Though the cybersecurity vendor has since reverted the update, chaos continues as companies continue to struggle to get back up…
Notorious Chinese Hacker Gang GhostEmperor Re-Emerges After 2 Years
After an extended period underground, the Chinese hackers have added a more sophisticated infection chain and additional EDR evasion techniques.
China’s APT41 Targets Global Logistics, Utilities Companies
According to Mandiant, among the many cyber espionage tools the threat actor is using is a sophisticated new dropper called…
In Cybersecurity, Mitigating Human Risk Goes Far Beyond Training
As threat actors get smarter about how they target employees, the onus is on organizations to create a strong line…
Latest WatchGuard Report Reveals Rise in Threat Actors Exploiting Remote Access
Cybersecurity threats continue to grow, with the threat landscape constantly evolving and hackers employing increasingly sophisticated and unpredictable methods. With…
Void Banshee APT Exploits Microsoft Zero-Day in Spear-Phishing Attacks
The threat group used CVE-2024-38112 and a "zombie" version of IE to spread Atlantida Stealer through purported PDF versions of…