A sophisticated spearphishing campaign has emerged targeting humanitarian organizations and Ukrainian government agencies, leveraging weaponized PDF attachments and fake Cloudflare…
Amazon Web Services (AWS), the backbone for countless websites and services, faced a severe outage last weekend that disrupted operations…
Email phishing attacks have reached a critical inflection point in 2025, as threat actors deploy increasingly sophisticated evasion techniques to…
Microsoft has rolled out an out-of-band emergency patch for a remote code execution (RCE) vulnerability affecting the Windows Server Update…
Toys "R" Us Canada has alerted customers to a significant data breach that potentially exposed their personal information, marking another…
Remcos, a commercial remote access tool marketed as legitimate surveillance software, has become the leading infostealer in malware campaigns during…
The HP OneAgent software update has disconnected Windows devices from Microsoft Entra ID. As a result, users can no longer…
Cybersecurity researchers have identified a sophisticated campaign where threat actors are leveraging compromised credentials to infiltrate Azure Blob Storage containers,…
A new open-source tool called PDF Object Hashing is designed to detect malicious PDFs by analyzing their structural "fingerprints." Released…
A sophisticated information-stealing malware written in Golang has emerged, leveraging blockchain technology to establish covert command-and-control channels. SharkStealer represents a…