Dell’s Hard-Coded Flaw: A Nation-State Goldmine – Dark Reading
A China-related attacker has exploited the vendor flaw since mid-2024, allowing it to move laterally, maintain persistent access, and deploy malware. – Read More
A China-related attacker has exploited the vendor flaw since mid-2024, allowing it to move laterally, maintain persistent access, and deploy malware. – Read More
Discover a strategic approach to govern scraping risks, balance security with business growth, and safeguard intellectual capital from automated data harvesting. – Read More
After detecting a zero-day attack, the country’s effective response was attributed to the tight relationship between its government and private industry. – Read More
Keenadu downloads payloads that hijack browser searches, commit ad fraud, and execute other actions without user knowledge. – Read More
Russia-aligned groups are probable culprits behind the wiper attacks against renewable energy farms, a manufacturer, and a heating and power plant. – Read More
It’s the path of lesser resistance, as remote monitoring and management (RMM) software offers stealth, persistence, and operational efficiency. – Read More
ClickFix campaigns have adapted to the latest defenses with a new technique to trick users into infecting their own machines with malware. – Read More
The GS7 cyberthreat group targets US financial institutions with near-perfect imitations of corporate portals to steal credentials and gain remote access. – Read More
30 copycat apps tricked users, and Google itself, into thinking they’re legitimate AI tools. – Read More
Zscaler’s acquisition of SquareX comes as competitors like CrowdStrike and Palo Alto Networks are also investing in secure browser technologies. – Read More
Threat actors are exploiting security gaps to weaponize Windows drivers and terminate security processes in targeted networks, and there may be no easy fixes in sight. – Read More
Espionage groups from China, Russia and other nations burned at least two dozen zero-days in edge devices in attempts to infiltrate defense contractors’ networks. – Read More
As AI deployments scale and start to include packs of agents autonomously working in concert, organizations face a naturally amplified attack surface. – Read More
It’s time to phase out the “patch and pray” approach, eliminate needless public interfaces, and enforce authentication controls, one expert says. – Read More
The AI-powered product delivers expert-grade malware analysis and reverse engineering in minutes. – Read More