A trusted tool has turned traitor. A new Citizen Lab investigation reveals that UyghurEditPP, a legitimate open-source Uyghur-language text editor,…
Cyble Labs reports the HeptaX campaign, a cyberattack using malicious LNK files and scripts to exploit Remote Desktop access, targeting…
Microsoft's latest intelligence report has revealed alarming efforts by Iranian state-linked groups to meddle in the 2024 US presidential election.…
The attackers reportedly encrypted some financial data and are threatening to release it unless they receive a ransom. An investigation…
The infection process unfolds with a PowerShell command embedded within the .LNK file, initiating the download and execution of a…
Threat actors linked to Chinese state interests have been targeting an unnamed high-profile Southeast Asian government organization since at least…
Security companies have historically focused on espionage incidents related to Windows systems. This has led to them overlooking similar threats…
British Columbia in Canada has faced multiple "sophisticated cybersecurity incidents" on government networks, province premier said this week. Premier David…
The threat actor's approach mirrors its name complexity, beginning with gathering sensitive data, conducting cyber espionage, and compromising targets' security.
Cybersecurity journalism during wartime is one of the most dangerous parts of a journalist's work. Earlier, war crimes included spying…
This website uses cookies. By continuing to use this website you are giving consent to cookies being used.
Read More