- Home
- Cybercrime and Ransomware
- Emerging Tech
- Threat Intelligence
- Expert Insights
- Careers and Learning
- Compliance
Subscribe to Updates
Subscribe to our newsletter and never miss our latest news
Subscribe my Newsletter for New Posts & tips Let's stay updated!
Browsing: malware
Quick Takeaways Attackers are abusing RubyGems by uploading over 150 malicious gems to exfiltrate publicly…
Quick Takeaways Attackers, likely nation-states, used AI to discover zero-day vulnerabilities and automate bypassing two-factor…
Essential Insights Hostile actors are now using AI to develop zero-day vulnerabilities and automate mass…
Top Highlights Iranian APT groups are actively using bulk-registered and look-alike domains impersonating trusted brands…
Fast Facts The new TrickMo Android banking trojan uses decentralized TON blockchain for covert command-and-control,…
Top Highlights Multiple vulnerabilities allow apps to execute arbitrary code, gain root privileges, or break…
Fast Facts A maliciously altered version of the Jenkins AST plugin was published, exploiting supply…
Summary Points Cybercriminals are now using AI to autonomously identify vulnerabilities and develop exploits before…
Fast Facts Hackers used AI to discover and exploit a previously unknown software vulnerability, marking…
Essential Insights Hacktivist groups like NoName05716 and 313 Team are conducting widespread DDoS and website…