News
Rapid digital transformation is most definitely creating vast new opportunities across Africa, but, at the same time, it’s ...
UAT-7237 exploits unpatched Taiwan servers using SoundBill, Cobalt Strike, and SoftEther VPN for persistent control.
Charon uses encrypted payloads and trusted binaries to bypass EDR defenses, marking a shift toward stealthier, more ...
Microsoft recently announced the launch of Project Ire – a dedicated AI agent for malware analysis and classification by automated reverse engineering. With this tool, the tech giant aims to facilitat ...
The global advanced persistent threat market was valued at $5.9 billion in 2021 and is projected to reach $30.9 billion by 2030, growing at a CAGR of 20.5% from 2022 to 2030.
A new report out today from CrowdStrike Holdings Inc. has revealed a dramatic escalation in adversary sophistication, with ...
Sri Lanka has been identified as a key target for SideWinder, dubbed “the most aggressive threat in APAC” by global cybersecurity giant Kaspersky. ..
This near-universal call for improvement reflects the growing complexity of cyberattacks, which include advanced persistent threats (APTs), ransomware, and phishing campaigns leveraging social ...
Kaspersky has attributed the recent cyber espionage attack targeting an organisation in southern Africa to the Chinese-speaking advanced persistent threat group APT41.
Amid a new round of UK government sanctions targeting Moscow's intelligence apparatus, the NCSC has formally attributed attacks orchestrated with a cleverly-designed malware to the GRU's Fancy ...
As detailed in the H2 2025 Cloud Threat Horizons Report, Google’s researchers have observed advanced persistent threat groups, including UNC3944, UNC2165 and UNC4393.
In a new blog posted on July 22, Microsoft Threat Intelligence confirmed that these groups include Linen Typhoon and Violet Typhoon, two China-based advanced persistent threat (APT) groups and ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results