News

Fog ransomware hackers are using an uncommon toolset, which includes open-source pentesting utilities and a legitimate ...
Black Basta affiliates use Teams phishing, Python scripts, and cURL to attack finance, insurance, and construction sectors.
The VanHelsing ransomware-as-a-service operation published the source code for its affiliate panel, data leak blog, and Windows encryptor builder after an old developer tried to sell it on the ...
In the very near future, victory will belong to the savvy blackhat hacker who uses AI to generate code at scale.
The Play ransomware group has hit about 900 organizations globally so far and uses “double extortion” after data theft.
While Symantec couldn’t identify the initial infection vector used in the attack, Fog ransomware actors have used critical ...
Based on intelligence gleaned from the leak of Black Basta ransomware messages, researchers are warning organizations to ...
The risks of executing untrusted Python code range from introducing vulnerabilities to compromising sensitive data. Yet, as AI agents grow more sophisticated, their reliance on dynamic code ...
Cybersecurity researchers Aikido Security recently discovered malicious code buried very deep in 17 popular Gluestack ...
Ransomware operators are now actively using ... “The author (of the malware) sells both the server code and the malware itself,” researchers added. “The server automatically wipes SSH ...
Aitharaju believes that security success hinges as much on people and process as on technology. In contemporary cybersecurity ...