The malicious platform Darcula, which operates under the Phishing-as-a-Service (PhaaS) model, is preparing to launch its third...
Mai Huong
19-year-old DOGE engineer Edward Coristin has secured a position at the U.S. Cybersecurity and Infrastructure Security Agency...
The Chinese state-sponsored hacking group Salt Typhoon employs a specialized utility, JumbledPath, to clandestinely monitor network traffic...
Cybercriminals continue to refine their techniques for concealing malicious software, leveraging legitimate programs to circumvent security mechanisms....
An investigation by WIRED has revealed that Google’s advertising ecosystem enables major brands to access sensitive information...
Experts at Orange Cyberdefense have uncovered a new cyber campaign dubbed Green Nailao, which targeted multiple European...
Microsoft has addressed a zero-day privilege escalation vulnerability in Power Pages, which had already been actively exploited...
A ransomware group operating under the Ghost moniker has infiltrated the systems of corporations and government institutions...
In January 2025, researchers at Juniper Threat Labs identified a novel JavaScript obfuscation technique that has been...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two critical vulnerabilities affecting Palo Alto Networks...