News

Threat actors continue to exploit ToolShell to gain unauthorized access to on-premises SharePoint servers. On August 6, 2025, the Cybersecurity ...
Corelight, the fastest-growing provider of network detection and response (NDR) solutions, today announced that veteran ...
By Gary Miliefsky, Publisher of Cyber Defense Magazine Black Hat, the cybersecurity industry’s most established and in-depth ...
A new Linux malware has recently caught the attention of security researchers. Identified as “Plague,” this malware is more ...
Defend against PhantomCard, SpyBanker, and KernelSU exploits—secure banking, block NFC fraud, and stop Android malware today.
Love them or hate them, defenders must handle with care Introduction I will never forget sourcing my first Swiss Army knife.
A new report demonstrates that conventional security systems are failing to identify many contemporary threats. OPSWAT ...
Russia's APT28 tested LLM-powered malware on Ukraine. The same tech that breaches enterprises is now selling for $250/month on the dark web.
A stealthy info-stealing malware designed to harvest passwords, cookies, payment info, and autofill data from web browsers..
Threat actors are leveraging a Unicode character to make phishing links appear like legitimate Booking.com links in a new ...
Charon uses encrypted payloads and trusted binaries to bypass EDR defenses, marking a shift toward stealthier, more ...
Black Hat USA 2025 was nothing short of groundbreaking. The show floor and conference tracks were buzzing with innovation, ...