Shining a Light on Shadow Apps: The Invisible Gateway to SaaS Data Breaches

Shadow apps, a segment of Shadow IT, are SaaS applications purchased without the knowledge of the security team. While ...

‘TIDrone’ Cyberattackers Target Taiwan’s Drone Manufacturers

TIDrone, linked to Chinese-speaking groups, deploys advanced malware through ERP software or remote desktop tools. Trend ...

Underground Demand for Malicious LLMs is Robust

The underground market for malicious large language models (LLMs) is thriving, according to researchers from Indiana ...

Key Cyber Insurance Stakeholders Urge Government To Help Close $900B in Uncovered Risk

Marsh McLennan and Zurich Insurance Group have issued a white paper highlighting the need for a public-private ...

New PIXHELL Attack Exploits Screen Noise to Exfiltrates Data from Air-Gapped Computers

A new side-channel attack dubbed PIXHELL could be abused to target air-gapped computers by breaching the “audio ...

Cybercriminals Target Latin American Banks with Mekotio, BBTok, and Grandoreiro Trojans

These campaigns aim to steal sensitive banking credentials using innovative tactics, expanding beyond traditional ...

Mustang Panda Deploys Advanced Malware to Spy on Asia-Pacific Governments

The threat actor tracked as Mustang Panda has refined its malware arsenal to include new tools in order to facilitate ...

Spyware Vendors’ Nebulous Ecosystem Helps Them Evade Sanctions

Spyware vendors have developed a complex ecosystem that enables them to evade sanctions effectively by utilizing a ...

1 22 23 24 25 26 27 28 29 30 31 32 667