Latest news available
Title Source Date
Qilin: Infection Chain with EDR Disabling Module Source: opens original article in a new tab
UAT-10608: Automated Credential Harvesting Campaign Targeting Web Applications Source: opens original article in a new tab
Cookie-controlled PHP webshells: A stealthy tradecraft in Linux hosting environments Source: opens original article in a new tab
Abuse of AI by Threat Actors Accelerates from Tool to Cyberattack Surface Source: opens original article in a new tab
Qilin EDR killer infection chain Source: opens original article in a new tab
How Microsoft Defender Protects High-Value Assets in Real-World Attack Scenarios Source: opens original article in a new tab
WhatsApp malware campaign delivers VBScript and MSI backdoors Source: opens original article in a new tab
Identity security is the new pressure point in modern cyberattacks Source: opens original article in a new tab
Sanctioned Cryptocurrency Exchange Claims $15 Million Theft by Hostile States Source: opens original article in a new tab
Amazon Eliminates Sideloading Support in Future Fire Sticks with Vega OS Source: opens original article in a new tab