Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

7 months ago

Arizona woman gets 8 years for helping North Korea-linked threat actors to infiltrate 309 U.S. firms with fake IT jobs.…

Operation CargoTalon targets Russia’s aerospace with EAGLET malware,<gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw>

7 months ago

Operation CargoTalon targets Russia’s aerospace and defense sectors with EAGLET malware, using TTN documents to exfiltrate data. SEQRITE Labs researchers…

Koske, a new AI-Generated Linux malware appears in the threat landscape

7 months ago

Koske is a new Linux malware designed for cryptomining, likely developed with the help of artificial intelligence. Koske is a…

Mitel patches critical MiVoice MX-ONE Auth bypass flaw

7 months ago

Mitel addressed a critical MiVoice MX-ONE flaw that could allow an unauthenticated attacker to conduct an authentication bypass attack. A…

Coyote malware is first-ever malware abusing Windows UI Automation

7 months ago

New Coyote malware uses Windows UI Automation to steal banking credentials, targeting Brazilian users across 75 banks and crypto platforms.…

SonicWall fixed critical flaw in SMA 100 devices exploited in Overstep malware attacks

7 months ago

SonicWall addressed a critical vulnerability, tracked as CVE-2025-40599 (CVSS score of 9.1), in SMA 100 appliances SonicWall addressed a critical…

DSPM & AI Are Booming: $17.87B and $4.8T Markets by 2033

7 months ago

The DSPM market hit around $1.2 billion in 2024 and should grow to $4.5 billion by 2033 (≈16.5% CAGR). The AI sector is projected to…

Stealth backdoor found in WordPress mu-Plugins folder

7 months ago

A new stealth backdoor has been discovered in the WordPress mu-plugins folder, granting attackers persistent access and control over compromised…

U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog

7 months ago

U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure…

This website uses cookies.