News

Rapid digital transformation is most definitely creating vast new opportunities across Africa, but, at the same time, it’s ...
UAT-7237 exploits unpatched Taiwan servers using SoundBill, Cobalt Strike, and SoftEther VPN for persistent control.
Charon uses encrypted payloads and trusted binaries to bypass EDR defenses, marking a shift toward stealthier, more ...
Is that a JuicyPotato on your network? A suspected Chinese-government-backed cyber crew recently broke into a Taiwanese web ...
Charon ransomware targets Middle East sectors using APT-style evasion, causing faster, harder-to-recover encryption.
A Russian-aligned hacking group has been identified targeting government bodies and energy sectors in Eastern Europe.
Telecommunications service providers (TSP) are foundational to the functioning of our modern technical society, serving as ...
A North Korean spy’s computer was hacked, leaking phishing logs, stolen South Korean government email platform source code, ...
An Office of Inspector General audit says the agency's existing program for overseeing banks' technology providers lacks ...
A newly discovered vulnerability in WinRAR has been exploited in the wild by the Russia-aligned cyber group RomCom. According ...
Rapid7, Inc., a pioneer in threat detection and exposure management, released its 2025 Access Brokers Report, a new research ...
A report from TRM Labs provides a detailed analysis of the Embargo ransomware group, its sophisticated tactics, techniques.