Cybersecurity researchers have discovered an innovative malware campaign that uses Google Sheets as a command-and-control (C2) mechanism.
The malicious activity was detected by Proofpoint starting...
The BlackByte ransomware group's threat actors have been seen exploiting a recently patched security flaw impacting VMware ESXi hypervisors, while also using vulnerable drivers...
Cybersecurity researchers are warning about the security risks in the machine learning (ML) software supply chain following the discovery of more than 20 vulnerabilities...
Cybersecurity researchers have discovered a new Linux malware that uses a unique technique to hide credit card skimmer code and maintain persistence on compromised...
Meta Platforms on Friday became the latest company after Microsoft, Google, and OpenAI to expose the activities of an Iranian state-sponsored threat actor, who...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has placed a security flaw affecting Versa Director in its Known Exploited Vulnerabilities (KEV) catalog after...