News
China-linked hackers use compromised SOHO devices in espionage campaign, targeting Taiwan, the U.S., and Southeast Asia.
The executable, as observed in prior Mustang Panda attacks, leverages DLL side-loading to launch a malicious DLL dubbed ...
Threat intelligence firm GreyNoise is warning of a "notable surge" in scanning activity targeting Progress MOVEit Transfer ...
A new campaign has been observed leveraging fake websites advertising popular software such as WPS Office, Sogou, and ...
CISA adds 3 critical vulnerabilities to KEV catalog, affecting AMI MegaRAC, D-Link, and Fortinet, urging mitigations by July ...
ClickOnce is offered by Microsoft as a way to install and update Windows-based applications with minimal user interaction. It ...
Iranian hackers linked to APT35 target Israeli professionals using AI-driven phishing, fake Gmail pages, and 2FA bypass.
SaaS platforms lack comprehensive data protection, exposing organizations to data loss, compliance risks, and cyberthreats.
Contagious Interview, first publicly documented by Palo Alto Networks Unit 42 in late 2023, is an ongoing campaign undertaken ...
Guest users in Entra ID may exploit billing roles to create and control subscriptions, escalating access undetected.
A critical vulnerability in Open VSX Registry could allow attackers to control VS Code extensions, threatening millions of developers.
Private Processing is designed to process AI requests within a secure environment called the confidential virtual machine ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results