advisories
advisories
EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations
By | | 0 Comments |
Threat actors have been observed using seemingly legitimate artificial intelligence…
⚡ Weekly Recap: Cisco 0-Day, Record DDoS, LockBit 5.0, BMC Bugs, ShadowV2 Botnet & More
By | | 0 Comments |
Cybersecurity never stops—and neither do hackers. While you wrapped up…
The State of AI in the SOC 2025 – Insights from Recent Study 
By | | 0 Comments |
Security leaders are embracing AI for triage, detection engineering, and…
Microsoft Flags AI-Driven Phishing: LLM-Crafted SVG Files Outsmart Email Security
By | | 0 Comments |
Microsoft is calling attention to a new phishing campaign primarily…
First Malicious MCP Server Found Stealing Emails in Rogue Postmark-MCP Package
By | | 0 Comments |
Cybersecurity researchers have discovered what has been described as the…
China-Linked PlugX and Bookworm Malware Attacks Target Asian Telecom and ASEAN Networks
By | | 0 Comments |
Telecommunications and manufacturing sectors in Central and South Asian countries…
Researchers Expose SVG and PureRAT Phishing Threats Targeting Ukraine and Vietnam
By | | 0 Comments |
A new campaign has been observed impersonating Ukrainian government agencies…
New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks
By | | 0 Comments |
The Russian advanced persistent threat (APT) group known as COLDRIVER…
Crash Tests for Security: Why BAS Is Proof of Defense, Not Assumptions
By | | 0 Comments |
Car makers don’t trust blueprints. They smash prototypes into walls.…
HeartCrypt’s wholesale impersonation effort
By | | 0 Comments |
How the notorious Packer-as-a-Service operation built itself into a hydraSource:…
1 2 3 19