The Chinese Cyber Organization, known as the Cybersecurity Association of China (CSAC), has asked for a thorough security assessment of Intel machinery marketed in China,
Cybersecurity experts found a malware campaign utilizing “Hijack Loader,” certified with valid code-signing certificates. HarfangLab uncovered the threat, distributing the Lumma information stealer via PowerShell
As corporations depend more on cloud environments and rapid development, the demand for strong security solutions has never been stronger. In 2024, the cybersecurity environment
As we celebrate Cybersecurity Week 2024, the industry is experiencing an unprecedented expansion fueled by AI-powered attacks and sophisticated protection technology. This year’s focus is
Generative AI (Gen AI) threats are possible risks and malicious actions that could arise from the application of creative artificial intelligence technologies. As we navigate
In the current fast-changing industrial environment, there is a rising and pressing danger of cyber attacks on cyber-physical systems. As per a recent report from
In September 2024, the cybersecurity landscape faced a significant threat with the emergence of the Gorilla Botnet, a formidable DDoS (Distributed Denial of Service) attack
Security researchers have released a proof-of-concept (POC) exploit for the recently disclosed Microsoft Office vulnerability CVE-2024-38200, which could allow attackers to capture users’ NTLMv2 hashes.
In an alarming development in cybersecurity, researchers from Trend Micro have uncovered a sophisticated attack campaign orchestrated by a Chinese-linked Advanced Persistent Threat (APT) group