Paragon Commercial Spyware Infects Prominent Journalists – Dark Reading
An unnamed customer of Paragon’s Graphite product used the commercial spyware to target at least two prominent European journalists in recent months. – Read More
An unnamed customer of Paragon’s Graphite product used the commercial spyware to target at least two prominent European journalists in recent months. – Read More
As Iran closes its cyberspace to the outside world, hacktivists are picking sides, while attacks against Israel surge and spread across the region. – Read More
OpenAI intends to help streamline the Defense Department’s administrative processes using artificial intelligence. – Read More
Many cybersecurity professionals still don’t feel comfortable admitting when they need a break. And the impact goes beyond being overworked. – Read More
The Android malware is targeting Turkish financial institutions, completely taking over legitimate banking and crypto apps by creating an isolated virtualized environment on a device. – Read More
Concerned by rapidly evolving evasion tactics, the new Jitter-Trap tool from Varonis aims to help organizations detect beacons that help attackers establish communication inside a victim network. – Read More
Security teams are no longer just the last line of defense — they are the foundation for responsible AI adoption. – Read More
An unidentified threat actor is using .lnk Windows shortcut files in a series of sophisticated attacks utilizing in-memory code execution and living-off-the-land cyberattack strategies. – Read More
The company acknowledged that cybercriminals had taken sensitive information on more than 8 million users, including names, phone numbers, car registration numbers, addresses, and emails. – Read More
Since at least January, the threat actor has been employing multiple malware tools to steal information for potential future attacks against Taiwanese businesses and government agencies. – Read More
While ushering in “great operational value” for organizations, private 5G networks add yet another layer to CISOs’ responsibilities. – Read More
Cybercrime response needs more aggressive actions from those seeking to protect victims and pursue criminals. – Read More
Sound suggestions on how to tackle four “quiet problems” that often slip through the security cracks. – Read More
A vulnerability in the popular Python-based tool for building AI agents and workflows is under active exploitation, allowing for full system compromise, DDoS attacks, and potential loss or theft of…
Though its operations are running smoothly, the airline warned customers and employees to exercise caution when sharing personal information online. – Read More