According to Acronis Threat Research Unit (TRU) researchers, DragonForce uses the same ChaCha20 and RSA encryption ...
Scattered Spider, ShinyHunters and LAPSUS$ have formed an enhanced coordinated threat network for extortion efforts ...
One of Ethereum’s leading decentralized finance (DeFi) protocols has suffered a major cyber-attack, resulting in ...
French prosecutors opened a judicial investigation on June 4, 2025, allowing law enforcement to deploy the operation. The ...
“The cloud’s greatest strength – on-demand infrastructure deployments – is also a source of systemic risk. In the race for ...
Instead of relying on more traditional methods, the backdoor exploits OpenAI’s Assistants API for command-and-control ...
Ukrainian national Oleksii Oleksiyovych Lytvynenko has appeared in a US court in connection with Conti ransomware charges ...
Flaws in Windows Graphics Device Interface (GDI) have been identified that allow remote code execution and information ...
Cybercriminals are helping traditional organized crime groups steal physical goods via cargo freight hijacking. Researchers at cybersecurity firm Proofpoint recently identified active malicious ...
The release builds on CISA’s Emergency Directive 25-02 and outlines measures such as restricting administrator access, using multi-factor authentication (MFA), tightening transport security settings ...
Since January 2024, over 2100 victims across Europe were named on extortion leak sites, with 92% involving file encryption and data theft. The region is the second-most targeted globally after North ...
Snahil Singh and Anoop Nadig say security teams must prioritize tackling the growing risks of third-party IoT devices ...