News

Talos believes that this crew is a subgroup of another Chinese APT, UAT-5918, which also targets Taiwan's critical ...
UAT-7237 exploits unpatched Taiwan servers using SoundBill, Cobalt Strike, and SoftEther VPN for persistent control.
Charon uses encrypted payloads and trusted binaries to bypass EDR defenses, marking a shift toward stealthier, more ...
Charon ransomware targets Middle East sectors using APT-style evasion, causing faster, harder-to-recover encryption.
IT leaders must know how to anticipate cyberattacks and defend their organizations, even as artificial intelligence makes ...
A Russian-aligned hacking group has been identified targeting government bodies and energy sectors in Eastern Europe.
Developed by Microsoft Research and the Defender teams, Project Ire utilizes advanced reasoning and reverse engineering tools ...
Project Ire promises to use LLMs to detect whether code is malicious or benign UPDATED Microsoft has rolled out an autonomous ...
In an era of cutting-edge technology, where fifth-generation fighter jets and long-endurance surveillance aircraft dominate the skies, a surprisingly primitive problem continues to affect military ...
Intelligence-driven cybersecurity company Intel 471 Inc. today announced the launch of Guided Threat Hunts, a new method driven tool that gives threat hunters capabilities to craft their own ...
In a new blog posted on July 22, Microsoft Threat Intelligence confirmed that these groups include Linen Typhoon and Violet Typhoon, two China-based advanced persistent threat (APT) groups and ...