Chinese Weaver Ant hackers spied on telco network for 4 years
A China-linked advanced threat group named Weaver Ant spent more than four years in the network of a…
A China-linked advanced threat group named Weaver Ant spent more than four years in the network of a…
African law enforcement authorities have arrested 306 suspects as part of ‘Operation Red Card,’ an INTERPOL-led international crackdown…
A critical severity vulnerability has been discovered in the Next.js open-source web development framework, potentially allowing attackers to…
Acronis Threat Research found 2M+ malicious URLs & 5,000+ malware instances in Microsoft 365 backup data—demonstrating how built-in…
At MWC 2025, Google confirmed it was working on screen and video share capabilities for Gemini Live, codenamed…
The FBI is warning that fake online document converters are being used to steal people’s information and, in…
Cloudflare announced that it closed all HTTP connections and it is now accepting only secure, HTTPS connections for…
Cybercriminals are abusing Microsoft’s Trusted Signing platform to code-sign malware executables with short-lived three-day certificates.
Cybercriminals are abusing Microsoft’s Trusted Signing platform to code-sign malware executables with short-lived three-day certificates.
Researchers have determined that Coinbase was the primary target in a recent GitHub Actions cascading supply chain attack…