Subscribe below for free to get these delivered straight to your inbox
Kaspersky integrates a new machine learning model into its SIEM to detect DLL hijacking, successfully uncovering real-world attacks using Cobalt Strike and info-stealers.
Discover the best and most secure VPNs for your iPhone. Our guide covers top-rated picks like NordVPN, ProtonVPN, and Windscribe for speed, privacy, and ease of use.
Kaspersky will host a 60-minute webinar on May 22, 2025, to discuss its Scan Engine, focusing on its advanced protection features and integration capabilities.
Amidst growing scientific pessimism about AI, a call to action urges researchers to champion a positive vision to steer the technology toward beneficial outcomes.
Learn how Kaspersky successfully trained a three-generation machine learning model to detect stealthy DLL hijacking attacks with high accuracy and few false positives.
The massive Aisuru IoT botnet manipulated Cloudflare’s top domain rankings by flooding its DNS service with queries, forcing the company to scrub the malicious domains.
China-linked APT group TA423 is targeting Australian and energy firms with the ScanBox keylogger via watering hole attacks initiated by tailored phishing emails.
Microsoft warns that recent October Windows security updates may trigger BitLocker recovery mode on some PCs, primarily affecting Intel devices with Modern Standby.
International law enforcement’s ‘Operation Chargeback’ has dismantled three credit card fraud networks, arresting 18 suspects accused of stealing €300 million.
A new report reveals 91.5% of malware is now delivered via encrypted HTTPS. Learn about the rise of fileless threats and a projected 150% surge in ransomware.
A look back at 2019 reveals it was a banner year for cyber threats. Key malware categories included bots, trojans, Remote Access Trojans (RATs), and ransomware.
New research shows an alarming arms race between AIs that design novel bioweapons and the screening software meant to detect them, revealing critical vulnerabilities.
A Threatpost report explores the permanent cybersecurity challenges of remote work, offering key insights on zero-trust security, VPNs, and employee habits.
PYSA ransomware surged to become November’s top threat, hitting government sectors with a 400% spike. Learn about its double-extortion tactics and Everest’s new access-selling model.
Discover the Maverick Trojan, a new fileless banking malware targeting Brazilians. It spreads via WhatsApp using a complex infection chain to steal financial data.
Cybercriminals are exploiting lax email authentication in Zendesk customer accounts to flood inboxes with email bombs appearing to come from trusted brands.
Learn to unmask common email dangers and defend your inbox. Our guide covers the key signs of phishing and malware, plus essential defense strategies for everyone.
AI can now generate hyper-realistic fake receipts for expense fraud, making them undetectable by humans. Learn how companies are fighting back with AI detection tools.
The COVID-19 pandemic accelerated digital transformation in healthcare, creating a perfect storm of cyber threats, from ransomware to medical espionage. Learn more.
The DOJ has indicted 31 people in a sophisticated poker cheating ring that used hacked shuffling machines and hidden tech to predetermine winning hands.
Discover the latest email phishing trends, from QR codes in encrypted PDFs to sophisticated MFA bypass attacks that mimic real services to steal one-time codes.
A new Cequence Security report highlights a massive surge in API-based attacks. Learn about the top three trends, including ATOs and application fraud.
Cybercriminals are targeting the freight industry using legitimate RMM tools to hijack systems, reroute shipments, and steal high-value physical cargo.
Cybersecurity researchers from Tenable have discovered seven critical vulnerabilities in OpenAI’s ChatGPT, enabling attackers to steal user data via prompt injection.
Pegasus spyware creator NSO Group is being sold to a US firm led by a Hollywood producer. This week’s news also covers DHS staff reassignments and a Discord breach.
Security researchers documented a real-world DDoS attack using AI-driven malware from the ‘Pumpkin’ botnet, which adaptively analyzed traffic to bypass defenses.
A market analysis projects the global military robot sector will reach USD 44,520 million by 2034, driven by the adoption of autonomous systems for safety.
Kaspersky has announced an upcoming webinar on March 20, 2025, detailing its strategic approach to cloud workload protection in modern hybrid environments.
Containers are fast and ephemeral, but their vulnerabilities are persistent. Learn why a complete security strategy, from build to runtime, is crucial for teams.
A factual recap of this week’s security news: the Lazarus Group targets Web3 with fake job offers, researchers crack Intel and AMD TEEs, and a new dark web tool emerges.
A cybersecurity weekly review covering the active exploitation of a WSUS vulnerability to distribute the Skuld infostealer and the public release of a PoC for a BIND 9 flaw.
Discover First Wap’s Altamides, a covert surveillance system that uses SS7 network flaws for untraceable, real-time phone tracking without infecting the device.
A factual account of the November 2008 McColo takedown, where researchers and ISPs collaborated to disconnect the botnet host, causing a massive drop in global spam.
Learn how attackers use hidden links and SEO spam to hijack your website’s authority. Discover how to detect, remove, and prevent this Black Hat SEO tactic.
University researchers reveal that a large portion of satellite communications are unencrypted, exposing sensitive military, corporate, and consumer data to eavesdropping.
Learn about AI Summarization Optimization (AISO), a new technique where people strategically alter their speech to manipulate AI meeting summaries and control the narrative.
Sanctioned bulletproof host Stark Industries, tied to Kremlin cyberattacks, evaded EU penalties by rebranding and shifting assets to newly created corporate shells.
A major Microsoft Azure outage caused by a configuration error impacted services like 365 and Xbox, highlighting the harsh reality of cloud dependency.
Discover how the Windows AmCache artifact helps digital forensics experts uncover evidence of malicious software, even after it has been deleted from a system.
An analysis of the recent Louvre jewel heist reveals shocking operational security failures, surveillance blind spots, and the tragic, irreversible loss of value.
A factual analysis of a reported event where an AI system allegedly mistook a snack for a weapon. This review found no verifiable reports to confirm the incident.
A recent study details how researchers used a purpose-built generative AI to systematically test and audit other LLMs on their ability to provide safe mental health advice.
A major AWS outage in the US-EAST-1 region, caused by a DynamoDB DNS resolution failure, took down major services worldwide. Learn about the impact.
You must be logged in to post a comment.