Threat actors are actively attempting to exploit a now-patched security flaw in Veeam Backup & Replication to deploy Akira and Fog ransomware.
Cybersecurity vendor Sophos...
Cybersecurity researchers have discovered an innovative malware campaign that uses Google Sheets as a command-and-control (C2) mechanism.
The malicious activity was detected by Proofpoint starting...
Cybersecurity researchers have found an accidentally leaked GitHub token that could have given unauthorized access to GitHub repositories of Python, Python Package Index (PyPI),...
A new sophisticated cyber threat group named CloudSorcerer has been detected targeting Russian government entities. They are using cloud services for command-and-control (C2) operations...
The Iranian state-backed hacking outfit, APT42, is employing sophisticated social engineering tactics to breach target networks and cloud environments.
The targets include Western and Middle...