News

Rapid digital transformation is most definitely creating vast new opportunities across Africa, but, at the same time, it’s ...
UAT-7237 exploits unpatched Taiwan servers using SoundBill, Cobalt Strike, and SoftEther VPN for persistent control.
Charon uses encrypted payloads and trusted binaries to bypass EDR defenses, marking a shift toward stealthier, more ...
Microsoft recently announced the launch of Project Ire – a dedicated AI agent for malware analysis and classification by automated reverse engineering. With this tool, the tech giant aims to facilitat ...
A large North Korean hacker group has been exposed in an alleged data breach involving two compromised systems, where a ...
Charon ransomware targets Middle East sectors using APT-style evasion, causing faster, harder-to-recover encryption.
A Russian-aligned hacking group has been identified targeting government bodies and energy sectors in Eastern Europe.
A North Korean spy’s computer was hacked, leaking phishing logs, stolen South Korean government email platform source code, ...
An Office of Inspector General audit says the agency's existing program for overseeing banks' technology providers lacks ...
A newly discovered vulnerability in WinRAR has been exploited in the wild by the Russia-aligned cyber group RomCom. According ...
Binance's Chief Security Officer, Jimmy Su, has identified North Korean hacking groups as one of the most significant threats facing the cryptocur ...
Rapid7, Inc., a pioneer in threat detection and exposure management, released its 2025 Access Brokers Report, a new research ...