Over 60 Malicious RubyGems Packages Used to Steal Social Media and Marketing Credentials
Socket’s Threat Research Team has exposed a persistent campaign involving over 60 malicious RubyGems packages…
Socket’s Threat Research Team has exposed a persistent campaign involving over 60 malicious RubyGems packages…
OpenAI has officially launched ChatGPT-5, marking a significant leap forward in artificial intelligence technology with…
Security researchers have discovered alarming new firmware for the popular Flipper Zero device that can…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive 25-02 on August 7,…
Security researchers have successfully demonstrated a sophisticated exploit of the Retbleed vulnerability, a critical CPU security…
Red teaming companies are specialized cybersecurity firms that use a proactive, adversarial approach to test…
Elite cybercriminals prefer LotL attacks because they’re incredibly hard to spot. Instead of deploying obvious…
Researchers at Cyata have disclosed nine previously unknown zero-day vulnerabilities in HashiCorp Vault, a widely…
Splunk has introduced PLoB (Post-Logon Behaviour Fingerprinting and Detection) in a world where compromised credentials…
Threat actors are increasingly using Scalable Vector Graphics (SVG) files to get beyond traditional defenses…