Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera
A joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScanand ANY.RUN, a solution…
A joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScanand ANY.RUN, a solution…
Vulnerability management is a core component of every cybersecurity strategy. However, businesses often use thousands of software without realising it…
The threat actor known as Tomiris has been attributed to attacks targeting foreign ministries, intergovernmental organizations, and government entities in…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog to include a security…
Cybersecurity researchers have discovered vulnerable code in legacy Python packages that could potentially pave the way for a supply chain…
The North Korean threat actors behind the Contagious Interview campaign have continued to flood the npm registry with 197 more…
As IT environments become increasingly distributed and organizations adopt hybrid and remote work at scale, traditional perimeter-based security models and…
The threat actor known as Bloody Wolf has been attributed to a cyber attack campaign that has targeted Kyrgyzstan since…
If you’re using community tools like Chocolatey or Winget to keep systems updated, you’re not alone. These platforms are fast,…
Microsoft has announced plans to improve the security of Entra ID authentication by blocking unauthorized script injection attacks starting a…