Source
DARKReading
A threat actor known as "Curly COMrades" is using Linux VMs to remain undetected in Windows environments while conducting Russia-aligned activities.
Successful ransomware groups have three key elements in common. Spoiler alert: indicators of success don't all revolve around artificial intelligence.
European organizations face an escalating cyber threat landscape as attackers leverage geopolitical tensions and AI-enhanced social engineering for attacks.
Malware used in a months-long attack demonstrates how bad actors are misusing generative AI services in unique and stealthy ways.
Android/BankBot-YNRK is currently targeting users in Indonesia by masquerading as legitimate applications.
Researchers uncovered a new threat campaign in which attackers use RMM tools to steal physical cargo out of the supply chain.
The power grid is being attacked online and IRL. Increasingly, regulators and industry experts agree: Security teams need to focus on both cyber and physical threats, together.
To write secure code with LLMs developers must have the skills to use AI as a collaborative assistant rather than an autonomous tool, Madou argues.
Reconnaissance and BEC are among the malicious activities attackers commit after compromising cloud accounts, using a framework based on the TruffleHog tool.
The spear-phishing campaign uses fake European Commission and NATO-themed lures to trick diplomatic personnel into clicking malicious links.