UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying

The China-nexus cyber espionage actor linked to the zero-day exploitation of security flaws in Fortinet, Ivanti, and ...

New Case Study: Unmanaged GTM Tags Become a Security Nightmare

Are your tags really safe with Google Tag Manager? If you’ve been thinking that using GTM means that your tracking ...

Void Arachne Uses Deepfakes and AI to Deliver Malicious VPNs to Chinese Users

Chinese-speaking users are the target of a never-before-seen threat activity cluster codenamed Void Arachne that employs ...

Warning: Markopolo’s Scam Targeting Crypto Users via Fake Meeting Software

A threat actor who goes by alias markopolo has been identified as behind a large-scale cross-platform scam that targets ...

Mailcow Mail Server Flaws Expose Servers to Remote Code Execution

Two security vulnerabilities have been disclosed in the Mailcow open-source mail server suite that could be exploited by ...

Signal Foundation Warns Against EU’s Plan to Scan Private Messages for CSAM

A controversial proposal put forth by the European Union to scan users’ private messages for detection child ...

Cybercriminals Exploit Free Software Lures to Deploy Hijack Loader and Vidar Stealer

Threat actors are luring unsuspecting users with free or pirated versions of commercial software to deliver a malware ...

The Annual SaaS Security Report: 2025 CISO Plans and Priorities

Seventy percent of enterprises are prioritizing investment in SaaS security by establishing dedicated teams to secure ...

1 169 170 171 172 173 174 175 176 177 178 179 663