[ad_1] A threat actor quietly spent the last two years integrating themself in the core team of maintainers of XZ Utils, a free software command-line data compressor widely used in…
[ad_1] A new publication from Google’s Threat Analysis Group focuses on commercial surveillance vendors, whose services are bought by governments for monitoring or spying purposes. Google is currently tracking more…
[ad_1] The Federal Bureau of Investigation and Cybersecurity & Infrastructure Security Agency warned in a joint advisory about a threat actor deploying a botnet that makes use of the Androxgh0st…
[ad_1] Two zero-day vulnerabilities have been discovered in Ivanti Secure VPN, a popular VPN solution used by organizations worldwide. The vulnerabilities are currently being exploited in the wild by at…
[ad_1] Risk mitigation tips are provided for each of these cybersecurity threats. Cybersecurity company ESET released its H2 2023 threat report, and we’re highlighting three particularly interesting topics in it:…
[ad_1] Recruiters and anyone else involved in hiring processes should be knowledgeable about this social engineering attack threat. A new report from U.S.-based cybersecurity company Proofpoint exposes a new attack…
[ad_1] A new report from French-based cybersecurity company Sekoia describes evolutions in the financial sector threat landscape. The sector is the most impacted by phishing worldwide and is increasingly targeted…
[ad_1] Kaspersky’s new report provides the company’s view on the advanced persistent threats landscape for 2024. Existing APT techniques will keep being used, and new ones will likely emerge, such…
[ad_1] Any company that is strategic could be targeted for the same kind of actions as this cyberattack. Follow these tips to mitigate your company’s risk to this cybersecurity threat.…
[ad_1] In the active Elektra-Leak campaign, attackers hunt for Amazon IAM credentials within public GitHub repositories before using them for cryptomining. Get tips on mitigating this cybersecurity threat. Image: WhataWin…