- Home
- Cybercrime and Ransomware
- Emerging Tech
- Threat Intelligence
- Expert Insights
- Careers and Learning
- Compliance
Subscribe to Updates
Subscribe to our newsletter and never miss our latest news
Subscribe my Newsletter for New Posts & tips Let's stay updated!
Browsing: information security
Top Highlights A new threat group, InedibleOchotense, disguises itself as ESET to launch spear-phishing attacks…
Fast Facts Cyber resilience has shifted from best practice to regulatory requirement, necessitating cross-functional and…
Fast Facts Google uncovered PROMPTFLUX, a VBScript malware that self-modifies and evolves by interacting with…
Quick Takeaways A cybercrime coalition combining groups like Scattered Spider, LAPSUS$, and ShinyHunters operates openly…
Quick Takeaways Microsoft uncovered SesameOp, a sophisticated backdoor exploiting the OpenAI Assistants API for stealthy…
Top Highlights SOCs are overwhelmed by false positives and lack of context, leading to inefficient…
Essential Insights Cybercriminals target trucking and logistics firms to infect systems with remote monitoring tools,…
Essential Insights Kimsuky, a North Korea-linked threat actor, deployed a new backdoor called HttpTroy via…
Quick Takeaways A suspected nation-state actor has developed Airstalk malware, leveraging the AirWatch API for…
Fast Facts A China-affiliated threat group, UNC6384, exploited a Windows shortcut vulnerability (CVE-2025-9491) to target…