A newly uncovered cyber-espionage campaign is drawing attention across the security community after researchers discovered a stealthy browser-based backdoor targeting Ukrainian organizations.
Security analysts from LAB52,...
A previously unknown state-aligned cyberespionage group has quietly compromised government and critical infrastructure organizations across 37 countries, according to a new investigation by Palo...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
A newly published threat assessment by Palo Alto Networks Unit 42 reveals a significant evolution in the tactics of the Iranian state-linked threat group...
A sophisticated malware campaign is actively targeting users through fake Telegram download websites, using advanced evasion techniques to bypass security controls and establish persistent...
The ongoing Iran conflict has entered a dangerous new phase one where missiles, drones, and cyberattacks are no longer separate threats, but part of...
A newly uncovered cyber-espionage campaign is drawing attention across the security community after researchers discovered a stealthy browser-based backdoor targeting Ukrainian organizations.
Security analysts from...
A new set of security vulnerabilities affecting Zoom’s widely used collaboration ecosystem has raised fresh concerns about the security posture of remote communication platforms...
Fortinet has released a new batch of security advisories addressing multiple vulnerabilities across its enterprise security ecosystem, including FortiSwitch, FortiManager, FortiAnalyzer, and FortiSandbox Cloud....
Artificial intelligence is rapidly becoming embedded in cybersecurity workflows from threat hunting to penetration testing. But relying on cloud-based AI services introduces privacy risks,...
Encrypted messaging platform Signal has confirmed that a series of targeted phishing attacks have resulted in the takeover of several user accounts, including those...
Cybercrime investigators in the United States have scored a significant victory against global online fraud networks after a Ghanaian national admitted his role in...
Cisco has issued a critical security advisory warning of an authentication bypass vulnerability in Cisco Catalyst SD-WAN Controller and Cisco Catalyst SD-WAN Manager that...
A new software supply chain threat has emerged, this time targeting developers integrating Stripe into .NET applications.
According to research published by ReversingLabs, threat actors...
A new and highly convincing refund scam is targeting French-speaking internet users by impersonating Avast, tricking victims into handing over full credit card details...
Security researchers have uncovered a technique that allows attackers to abuse Cortex XDR’s Live Response feature as a covert command-and-control (C2) channel - effectively...
Broadcom has released a critical security advisory addressing multiple vulnerabilities in VMware Aria Operations that could allow remote code execution, stored cross-site scripting (XSS),...
In a year where cybercriminals increasingly weaponized artificial intelligence to launch more convincing scams and stealthier malware, Google has dramatically scaled its defenses across...
The conversation around Data Loss Prevention (DLP) is often filled with vendor promises and ambitious deployment plans. But what really happens when theory meets...
Dubai, UAE - February 4, 2026.Artificial intelligence is reshaping cybersecurity faster than many organizations can adapt and that reality was front and center during...
Microsoft has disclosed a Windows Remote Access Connection Manager vulnerability that allows attackers to trigger a denial-of-service (DoS) condition on affected systems.
Tracked as...