AI-generated Slopoly malware used by Hive0163 in 2026 attacks maintained access for over a week, highlighting how AI ...
Signed malware backed by a stolen EV certificate deployed legitimate RMM tools to gain persistent access inside enterprise ...
Threat actors are now abusing DNS queries as part of ClickFix social engineering attacks to deliver malware, making this the first known use of DNS as a channel in these campaigns. ClickFix attacks ...
Districts bolster physical security by screening guests with visitor management software and integrating that with door access control and surveillance cameras. When IT Services Director Bob Fishtrom ...
Researchers link Silver Dragon APT to APT41 after attacks on government entities using Cobalt Strike, DNS tunneling, and Google Drive-based C2.
Discover the 7 best cloud orchestration tools for enterprises in 2026, including AWS CloudFormation, Ansible, Spacelift, CloudBolt, and more. Compare features, pricing, multi-cloud support, and use ...
For more than a year, a Russian-speaking threat actor targeted human resource (HR) departments with malware that delivers a new EDR killer named BlackSanta.
After several years of using simple implants, the Russia-affiliated threat actor is back with two new sophisticated malware tools.
ESET researchers document how the Sednit APT group has reemerged with a modern toolkit centered on two paired implants – BeardShell and Covenant.
Throughout early 2026, SentinelOne’s Digital Forensics & Incident Response (DFIR) team has responded to several incidents where FortiGate Next-Generation Firewall (NGFW) appliances have been ...
The Contagious Interview campaign weaponizes job recruitment to target developers. Threat actors pose as recruiters from crypto and AI companies and deliver backdoors such as OtterCookie and ...
The vulnerability is especially dangerous because this model sits in the network core, so attackers could intercept or redirect data, says an expert. Network admins with Juniper PTX series routers in ...