Cybersecurity researchers have discovered an innovative malware campaign that uses Google Sheets as a command-and-control (C2) mechanism.
The malicious activity was detected by Proofpoint starting...
Cybersecurity researchers have discovered new network infrastructure created by Iranian threat actors to support activities related to the recent targeting of U.S. political...
A non-profit supporting Vietnamese human rights has been the target of a multi-year campaign designed to deliver a variety of malware on compromised hosts.
Cybersecurity...
Fortra has addressed a critical security flaw impacting FileCatalyst Workflow that could be abused by a remote attacker to gain administrative access.
The vulnerability, tracked...