Source
DARKReading
Microsoft said that Office 365 tenants with weak configurations and who don't have strict anti-spoofing protection enabled are especially vulnerable.
Pro-Russian group NoName057(16) uses a custom denial-of-service tool to mobilize volunteers and disrupt government, media, and institutional sites tied to Ukraine and the West.
Cyber's role in the US raid on Venezuela remains a question, though President Trump alluded to "certain expertise" in shutting down the power grid in Caracas.
An emerging threat actor that goes by "Zestix" used an assortment of infostealers to obtain credentials and breach file-sharing instances of approximately 50 enterprises.
Scattered Lapsus$ Hunters, also known as ShinyHunters, were drawn in using a realistic, yet mostly fake, dataset.
Threat actors are using the social engineering technique and a legitimate Microsoft tool to deploy the DCRat remote access Trojan against targets in the hospitality sector.
These startups reimagined browser security, pioneered application security for AI-generated code, and are building consensus on agentic vs. human costs.
With employees looking for the benefits of artificial intelligence, a fintech company stepped up controls with automation.
Insured entities are becoming more sophisticated in their views on how cyber policies fit into their broader risk management plans.
A memory leak security vulnerability allows unauthenticated attackers to extract passwords and tokens from MongoDB servers.