LockBit Operators Use Stealthy DLL Sideloading to Mask Malicious App as Legitimate One
Operators of LockBit ransomware have improved their tactics, methods, and procedures (TTPs) to avoid detection…
Operators of LockBit ransomware have improved their tactics, methods, and procedures (TTPs) to avoid detection…
Sonatype’s automated detection systems have uncovered an expansive and ongoing infiltration of the global open-source…
Check Point Research (CPR) has delved into the operations of Storm-2603, a recently identified threat…
Chinese-speaking threat actors have used the PlayPraetor Remote Access Trojan (RAT) to infiltrate more than…
Threat actors are leveraging Microsoft 365’s Direct Send feature to launch sophisticated phishing campaigns that…
Microsoft Threat Intelligence has exposed a sophisticated cyberespionage operation orchestrated by the Russian state-sponsored actor…
A significant privacy breach has emerged in the artificial intelligence landscape, as ChatGPT shared conversations…
Illumina Inc., a leading genomic sequencing company, has agreed to pay $9.8 million to settle…
Microsoft has announced a significant new feature for IT administrators that will enhance network monitoring…
Threat actors are leveraging sophisticated phishing campaigns by creating fake Microsoft OAuth applications to impersonate…