According to the latest report by global security company Kaspersky, 22.9 percent of web users in India are at risk of ...
On a cold winter night in 2016, Ukrainians experienced the first-ever known blackout caused by malicious code (malware) ...
One particularly nasty form of malware is code which is able to connect to command and control servers to download new payloads. ObjCShellz is an example of a Mac version, which can be remotely ...
The North Korean cyber-espionage group Kimsuki, linked to the military intelligence agency Reconnaissance General Bureau (RGB ...
The Q1 2024 edition of the HP Wolf Security Threat Insights Report sheds light on notable malware campaigns and techniques ...
The fact that Christie’s was able to respond effectively so quickly to its security breach indicates that people there have thought about and planned for these situations.” ...
Researchers find a new version of Cuckoo, but this one is being distributed to macOS victims a bit differently.
A Chinese-speaking hacking group is targeting individuals tied to a U.S. artificial intelligence company in an ongoing ...
Cryptocurrency theft and financial fraud are the new M.O. of the 15-year-old malware operation that has hit organizations ...
Noteworthy stories that might have slipped under the radar: FBI is targeting Scattered Spider, Australia’s MediSecure hacked, ...
The North Korea-linked Kimsuky hacking group has launched a new social engineering campaign targeting activists in the North ...