Senior executives agreed at a recent Specops Software roundtable: helpdesks have become a primary attack surface.
Fox Tempest is a financially motivated threat actor operating a malware‑signing‑as‑a‑service (MSaaS) used by other ...
Threat actors are exploiting CVE-2026-42945, a critical NGINX vulnerability that leads to remote code execution if ASLR is ...
Microsoft has confirmed a vulnerability in on-premises Exchange Server that could result in surprise script execution in victims' browsers. Tracked as CVE-2026-42897, the flaw affects Outlook Web ...
CVE-2026-41940 exploitation by 2,000 IPs enabled Filemanager backdoor attacks, causing credential theft and persistent access ...
ClaudeBleed, a vulnerability in Claude in Chrome, allows malicious extensions to hijack the AI agent for nefarious purposes.
Ransomware continues to pose a serious threat to U.S. critical infrastructure, with more than 2,100 related incidents reported to federal authorities in 2025, according to the latest FBI Internet ...
Picus Labs has released a report that ranks MITRE ATT&CK techniques. According to the report, ransomware encryption is on the decline. Moving up the ranks is a malware that plays dead until it's ripe ...
The Cybersecurity and Infrastructure Security Agency has published a process for recovering files for organizations affected by the ESXiArgs ransomware, which has wreaked havoc on organizations across ...
A key-handling defect in the ransomware can permanently lock files by discarding private encryption keys, leaving affected organizations unable to recover data even if a ransom is paid. A newly ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results