
Security Intelligence
APT29’s tactics age like a ‘fine wine’
APT29 uses deceptive emails mimicking invitations to wine-tasting events, enticing recipients to download a malicious...
Security Intelligence
APT29 uses deceptive emails mimicking invitations to wine-tasting events, enticing recipients to download a malicious...
Security Intelligence
Rollout of new Microsoft leaked credentials feature inadvertently causes widespread account lockouts across various...
Security Intelligence
A newly identified remote access trojan (RAT) called ResolverRAT is actively targeting healthcare and pharmaceutical...
Security Intelligence
Researchers uncover significant vulnerabilities in the 2020 Nissan Leaf electric vehicle.
Security Intelligence
Google addresses longstanding privacy issue in Chrome that allowed websites to detect users' browsing history.
Security Intelligence
Threat actors observed leveraging new method to exploit previously patched FortiOS vulnerability.
Security Intelligence
Field Effect security intelligence warns threat actors likely to leverage U.S. tariff confusion for phishing campaigns.
Security Intelligence
Smishing campaign mimics E-ZPass and other U.S.-based toll agencies and sending fraudulent text messages to individuals.
Security Intelligence
Cybercriminals are increasingly using a tactic called “fast flux” to hide their infrastructure and hinder takedown...
Security Intelligence
Ivanti reports suspected Chinese state-sponsored threat actor UNC5221 exploiting zero-day vulnerability in Connect...
Security Intelligence
Max severity remote code execution ulnerability, designated CVE-2025-30065, discovered in Apache Parquet.
Security Intelligence
Confusion ensues after two different CVEs are assigned to the same actively exploited CrushFTP vulnerability.