News

Threat actors continue to exploit ToolShell to gain unauthorized access to on-premises SharePoint servers. On August 6, 2025, the Cybersecurity ...
Corelight, the fastest-growing provider of network detection and response (NDR) solutions, today announced that veteran ...
Check out what CISA found after it dissected malware from the latest SharePoint hacks. Plus, the U.K.’s cyber agency is overhauling its cyber framework to keep pace as threats escalate. In addition, ...
CVE-2017-11882 in discontinued Equation Editor still attracting keylogger campaigns despite software being killed off in 2018 ...
By Gary Miliefsky, Publisher of Cyber Defense Magazine Black Hat, the cybersecurity industry’s most established and in-depth ...
A new Linux malware has recently caught the attention of security researchers. Identified as “Plague,” this malware is more ...
Defend against PhantomCard, SpyBanker, and KernelSU exploits—secure banking, block NFC fraud, and stop Android malware today.
A new report demonstrates that conventional security systems are failing to identify many contemporary threats. OPSWAT ...
Russia's APT28 tested LLM-powered malware on Ukraine. The same tech that breaches enterprises is now selling for $250/month on the dark web.
Threat actors are leveraging a Unicode character to make phishing links appear like legitimate Booking.com links in a new ...
A stealthy info-stealing malware designed to harvest passwords, cookies, payment info, and autofill data from web browsers..
Charon uses encrypted payloads and trusted binaries to bypass EDR defenses, marking a shift toward stealthier, more ...