News

Is that a JuicyPotato on your network? A suspected Chinese-government-backed cyber crew recently broke into a Taiwanese web ...
UAT-7237 exploits unpatched Taiwan servers using SoundBill, Cobalt Strike, and SoftEther VPN for persistent control.
Detecting advanced persistent threats (APTs) at a host via data provenance has emerged as a valuable yet challenging task. Compared with attack rule matching, machine learning approaches offer new ...
Charon uses encrypted payloads and trusted binaries to bypass EDR defenses, marking a shift toward stealthier, more ...
Charon ransomware targets Middle East sectors using APT-style evasion, causing faster, harder-to-recover encryption.
IT leaders must know how to anticipate cyberattacks and defend their organizations, even as artificial intelligence makes ...
A Russian-aligned hacking group has been identified targeting government bodies and energy sectors in Eastern Europe.