- Hacker Groups take to Telegram, Signal and Darkweb to assist Protestors in Iran. (to the original material)
- Multi-platform Chaos malware threatens to live up to its name. (to the original material)
- The holy trifecta for developing a secure API. (to the original material)
- Businesses find remote work security risks less daunting than before. (to the original material)
- Hackers now sharing cracked Brute Ratel post-exploitation kit online. (to the original material)
- Hacker shares how they allegedly breached Fast Company’s site. (to the original material)
- IRS warns Americans of massive rise in SMS phishing attacks. (to the original material)
- Auth0 warns that some source code repos may have been stolen. (to the original material)
- Google to test disabling Chrome Manifest V2 extensions in June 2023. (to the original material)
- Stealthy hackers target military and weapons contractors in recent attack. (to the original material)
- New Chaos malware infects Windows, Linux devices for DDoS attacks. (to the original material)
- Ethernet VLAN Stacking flaws let hackers launch DoS, MiTM attacks. (to the original material)
- Cryptominers hijack $53 worth of system resources to earn $1. (to the original material)
- Leaked LockBit 3.0 builder used by ‘Bl00dy’ ransomware gang in attacks. (to the original material)
- US Government to Study Cyber Insurance Backstop. (to the original material)
- Microsoft 365 Email Hack Led to American Airlines Breach. (to the original material)
- WhatsApp Patches 2 Flaws Affecting Apple and Android Users. (to the original material)
- Groups Urge HHS to Extend 'Information Blocking' Deadline. (to the original material)
- Jamf Buys ZecOps to Detect Advanced Hacks on Mobile Devices. (to the original material)
- Most organizations had a cloud-related security incident in the last year. (to the original material)
- How to move proactively through the security maturity journey. (to the original material)
- Threat actors use Quantum Builder to deliver Agent Tesla malware. (to the original material)
- Online Disinformation: Under the hood of a Doppelgänger. (to the original material)
- APT28 relies on PowerPoint Mouseover to deliver Graphite malware. (to the original material)
- Bl00dy ransomware gang started using leaked LockBit 3.0 builder in attacks. (to the original material)
- NUVOLA: the new Cloud Security tool. (to the original material)
- Meta dismantled the largest Russian network since the war in Ukraine began. (to the original material)
- New campaign uses government, union-themed lures to deliver Cobalt Strike beacons. (to the original material)
- Protecting teens from sextortion: What parents should know. (to the original material)
- Threat Spotlight: In-depth look at a cryptominer attack exploiting the Confluence bug. (to the original material)
- Crypto, really. Part II: non-fungible tokens. (to the original material)