News

After warning 9to5Mac last month about undetectable Mac malware hidden in a fake PDF converter site, Mosyle, a leader ...
The Akira ransomware gang is actively exploiting CVE-2024-40766, a year-old critical-severity access control vulnerability, ...
Attackers are evolving their malware delivery tactics by weaponing malicious prompts embedded in document macros to hack AI ...
A sophisticated fileless malware campaign has been observed using legitimate tools to deliver AsyncRAT executed in memory ...
Ron Wyden urges FTC to probe failure to secure Windows after attackers used Kerberoasting to cripple Ascension Microsoft is ...
Shady, China-based company, all the apps needed for a fully automated attack - sounds totally legit Villager, a new ...