News

Researchers from Palo Alto Networks say they are investigating a ransomware attack related to the recently disclosed ...
The activity has been attributed to Storm-2603, which, according to Microsoft, is a suspected China-based threat actor that ...
One strain in circulation is said to be the “Warlock” ransomware, distributed freely within compromised environments. The pattern of chained exploits, combining the newer CVEs with older ones like CVE ...
In a world increasingly dependent on digital infrastructure, cybercrime has become an ever-prevalent threat. In the latest wave of cyberattacks, ...
Microsoft announced that Chinese state-sponsored hackers had exploited vulnerabilities in its popular SharePoint software but ...
The ongoing campaign, first detected in early 2025, is designed to use the OAuth applications as a gateway to obtain ...
Proofpoint observed campaigns impersonating trusted brands like SharePoint and DocuSign with malicious OAuth applications to ...
Spy vs. spy China has accused US intelligence agencies of exploiting a Microsoft Exchange zero-day exploit to steal ...
Microsoft investigates whether the ToolShell exploit was leaked via MAPP, port cybersecurity, physical backdoor used for ATM ...
The U.S. alleged the company knowingly sold genetic-sequencing systems with software vulnerabilities to federal agencies.
Most payments are less than $1 million, but 8% of successfully attacked US companies have paid a ransom four or more times, ...