Cybersecurity Blog
North Korean Hackers Deploy New Golang Malware ‘Durian’ Against Crypto Firms
The North Korean threat actor tracked as Kimsuky has been observed deploying a previously undocumented Golang-based ...
Telus Acquires Cybersecurity Services Firm Vumetric
Telus announced Tuesday its acquisition of Vumetric Cybersecurity, a Toronto-based cybersecurity provider that ...
New LLMjacking Attack Uses Stolen Cloud Credentials to Target Cloud-Hosted AI Models
Sysdig researchers discovered evidence of a reverse proxy for LLMs being used to provide access to the compromised ...
Update: Thwarted Cyberattack Targeted Library of Congress in Tandem With October British Library Breach
The Library of Congress was targeted in a cyberattack that occurred in parallel with a high-profile intrusion into the ...
Android Remote Access Trojan Equipped to Harvest Credentials
This malware uses famous Android app icons to mislead users and trick victims into installing the malicious app on their ...
Report: Global Ransomware Crisis Worsens
According to NTT Security Holdings’ 2024 Global Threat Intelligence report, ransomware and extortion incidents increased ...
CensysGPT: AI-Powered Threat Hunting for Cybersecurity Pros (Webinar)
Artificial intelligence (AI) is transforming cybersecurity, and those leading the charge are using it to outsmart ...
Monday.com Removes “Share Update” Feature Abused for Phishing Attacks
The phishing emails pretended to come from a “Human Resources” department, asking users to either ...