Qilin disables 300+ EDR drivers using BYOVD in 2025 attacks, delaying encryption six days, increasing breach impact.
A multi-OS attack can turn one threat into several different investigations at once. The campaign may follow a different path ...
Phishing surge, LinkedIn tracking claims, spyware use, and rising stealers expose growing abuse of trusted systems.
LiteLLM 1.82.7–1.82.8 supply chain attack exposed 33,185 secrets across 6,943 machines, leaving 3,760 valid credentials ...
DPRK-linked actors use GitHub C2 and LNK phishing in South Korea, enabling persistent PowerShell control and data ...
AI-driven attacks optimize mediocrity in standardized environments, lowering costs to $5 per attack and raising SMB ...
AI matured detection capabilities, but over 100 engagements show human leadership drives cyber resilience and action.
BKA identified REvil leaders tied to 130 German attacks causing €35.4M damage, exposing key ransomware figures.
M stolen after six-month DPRK social engineering campaign began fall 2025, exposing Drift’s contributors and cloud assets.
Strapi plugins exploit Redis and PostgreSQL via postinstall scripts, enabling persistent access and data theft.
CVE-2026-35616 (CVSS 9.1) exploited since March 31, 2026, affects FortiClient EMS 7.4.5–7.4.6, enabling privilege escalation.
"The C2 hosts a web-based graphical user interface (GUI) titled 'NEXUS Listener' that can be used to view stolen information ...