(auto updated daily)
- Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill’s threat experts. Each story shines a light on underground activities, the threat actors involved, and why you should care, along with what you can do to mitigate risk. Cybersecurity professionals are facing unprecedented challenges as they strive to […]
- Google Introduces Project Naptime for AI-Powered Vulnerability Research
- Critical RCE Vulnerability Discovered in Ollama AI Infrastructure Tool
- Ease the Burden with AI-Driven Threat Intelligence Reporting
- RedJuliett Cyber Espionage Campaign Hits 75 Taiwanese Organizations
- Multiple Threat Actors Deploying Open-Source Rafel RAT to Target Android Devices
- ExCobalt Cyber Gang Targets Russian Sectors with New GoRed Backdoor
- Warning: New Adware Campaign Targets Meta Quest App Seekers
- U.S. Treasury Sanctions 12 Kaspersky Executives Amid Software Ban
- Chinese Hackers Deploy SpiceRAT and SugarGh0st in Global Espionage Campaign
- Military-themed Email Scam Spreads Malware to Infect Pakistani Users
- How to Use Tines's SOC Automation Capability Matrix
- Oyster Backdoor Spreading via Trojanized Popular Software Downloads
- SolarWinds Serv-U Vulnerability Under Active Attack - Patch Immediately
- U.S. Bans Kaspersky Software, Citing National Security Risks
- Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs
- French Diplomatic Entities Targeted in Russian-Linked Cyber Attacks
- Tool Overload: Why MSPs Are Still Drowning with Countless Cybersecurity Tools in 2024
- Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021
- New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration
- Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations
- Kraken Crypto Exchange Hit by $3 Million Theft Exploiting Zero-Day Flaw
- UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying
- New Case Study: Unmanaged GTM Tags Become a Security Nightmare
- New Threat Actor 'Void Arachne' Targets Chinese Users with Malicious VPN Installers
- Warning: Markopolo's Scam Targeting Crypto Users via Fake Meeting Software
- Mailcow Mail Server Flaws Expose Servers to Remote Code Execution
- Signal Foundation Warns Against EU's Plan to Scan Private Messages for CSAM
- Cybercriminals Exploit Free Software Lures to Deploy Hijack Loader and Vidar Stealer
- The Annual SaaS Security Report: 2025 CISO Plans and Priorities
- New Malware Targets Exposed Docker APIs for Cryptocurrency Mining
- VMware Issues Patches for Cloud Foundation, vCenter Server, and vSphere ESXi
- Singapore Police Extradites Malaysians Linked to Android Malware Fraud
- ASUS Patches Critical Authentication Bypass Flaw in Multiple Router Models
- China-Linked Hackers Infiltrate East Asian Firm for 3 Years Using F5 Devices
- What is DevSecOps and Why is it Essential for Secure Software Delivery?
- Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor
- NiceRAT Malware Targets South Korean Users via Cracked Software
- U.K. Hacker Linked to Notorious Scattered Spider Group Arrested in Spain
- Grandoreiro Banking Trojan Hits Brazil as Smishing Scams Surge in Pakistan
- Pakistani Hackers Use DISGOMOJI Malware in Indian Government Cyber Attacks
- Meta Pauses AI Training on EU User Data Amid Privacy Concerns
- Google's Privacy Sandbox Accused of User Tracking by Austrian Non-Profit
- Learn to Secure Petabyte-Scale Data in a Webinar with Industry Titans
- Why Regulated Industries are Turning to Military-Grade Cyber Defenses
- ZKTeco Biometric System Found Vulnerable to 24 Critical Security Flaws
- North Korean Hackers Target Brazilian Fintech with Sophisticated Phishing Tactics
- Microsoft Delays AI-Powered Recall Feature for Copilot+ PCs Amid Security Concerns
- New Attack Technique 'Sleepy Pickle' Targets Machine Learning Models
- Arid Viper Launches Mobile Espionage Campaign with AridSpy Malware
- Why SaaS Security is Suddenly Hot: Racing to Defend and Comply
Leave a comment