Expert speakers discussed the impact of reported cutbacks to CISA on the ability of local officials to protect against ...
Threat actors are exploiting cloud platforms like Adobe and Dropbox to evade email gateways and steal credentials ...
A PhaaS platform, dubbed 'Morphing Meerkat,' uses DNS MX records to spoof over 100 brands and steal credentials, according to ...
Newly identified CoffeeLoader uses multiple evasion techniques and persistence mechanisms to deploy payloads and bypass ...
10 Apr 2025, 15:00 BST , 10:00 EDT ...
Unlike previous versions of PJobRAT, which included WhatsApp message-stealing functionality, the latest iteration has shifted ...
Once considered inactive, the Chinese cyber espionage group FamousSparrow has reemerged, targeting organizations across the ...
The UK’s National Cyber Security Centre (NCSC) has published new guidance designed to minimize malicious domain registrations ...
Forescout researchers found multiple vulnerabilities in leading solar power system manufacturers, which could be exploited to ...
EU security agency ENISA has released a new report outlining the threats and potential mitigations for the space sector ...
Standards body ETSI has defined a scheme for key encapsulation mechanisms with access control (KEMAC), enabling ...
McAfee researchers have identified a new wave of Android malware campaigns leveraging .NET MAUI to steal sensitive user ...