fp-4a
-
Read moreCybercriminals use a fake Microsoft Teams download site to distribute the Odyssey macOS stealer, stealing credentials, crypto wallets, and sensitive data. Learn how to protect your Mac.
-
Read moreDiscover PromptLock, the first AI-powered ransomware using OpenAI's gpt-oss:20b model, enabling sophisticated attacks across multiple platforms.
-
Read moreDiscover the advanced evasion techniques and encryption methods used by the Lockbit ransomware variant targeting Linux-based ESXi servers. Learn how it operates and the implications for cybersecurity.
-
Read moreMicrosoft has revealed a critical RCE vulnerability in Teams (CVE-2025-53783) that could let attackers read, write, and delete messages. Learn about the risks and fixes.
-
Read moreHackers exploit a legitimate driver to bypass Microsoft Defender and install Akira ransomware. Learn how this vulnerability works and how to protect your PC.
-
Read moreCybercriminals compromised corporate systems in under five minutes by exploiting QuickAssist and PowerShell scripting. Learn how social engineering facilitated this rapid breach.
-
Read moreCybercriminals are using free trials of Endpoint Detection and Response (EDR) software to disable existing security measures. Learn about the BYOEDR attack technique and its implications.
-
Read moreA recent cyberattack on a US chemicals company exploited the SAP NetWeaver vulnerability CVE-2025-31324 to deploy Auto-Color malware. Learn about the attack details and key takeaways.
-
Read moreThe Coyote banking Trojan, active since February 2024, is the first malware to exploit the Windows UI Automation framework, targeting banks and crypto exchanges in Brazil. Learn how it operates and the risks involved.
-
Read moreCybersecurity researchers reveal a campaign targeting poorly secured Linux servers through SSH brute force attacks to deploy the SVF Botnet, a Python-based DDoS malware using Discord for command-and-control.