A security compromise so stealthy that it doesn’t even require your interaction? Yes, zero-click attacks require no...
ChatGPT would probably say “Definitely not!”, but will we learn any lessons from the rush to regulate...
The past year has seen over 10,000 downloads of malicious packages hosted on the official Python package...
Can DNS protection technology transform consumers’ worries about cybercrime with a trust-based approach?
ESET researchers document a series of new OilRig downloaders, all relying on legitimate cloud service providers for...
As personal devices within corporate networks make for a potentially combustible mix, a cavalier approach to BYOD...
Threat actors are exploiting unpatched Atlassian servers to deploy a Linux variant of Cerber (aka C3RB3R) ransomware....
The introduction of Open AI’s ChatGPT was a defining moment for the software industry, touching off a...
A previously undocumented “flexible” backdoor called Kapeka has been “sporadically” observed in cyber attacks targeting Eastern Europe, including Estonia...
A new Google malvertising campaign is leveraging a cluster of domains mimicking a legitimate IP scanner software...