Cybercrime

ZuRu Malware Targets macOS Users with Trojanized Termius App
Endpoint & Device Security ZuRu Malware Targets macOS Users with Trojanized Termius App

Could your trusted apps be silently compromising your system security? Trusted applications, like the widely-used Termius app for managing SSH clients and servers, are an essential component of daily digital interactions. However, the recent discovery of a trojanized version exploits this trust,

Ahold Delhaize Cyberattack Exposes Data of 2 Million Plus Individuals
Data Protection & Privacy Ahold Delhaize Cyberattack Exposes Data of 2 Million Plus Individuals

What would you do if your most sensitive data—your Social Security number, health records, and bank account details—fell into the wrong hands? This alarming situation has become a reality for over 2 million individuals affected by a recent significant cyberattack on Ahold Delhaize USA. The company,

Ransomware Disrupts Ingram Micro's Operations Amid Probe
Malware & Threats Ransomware Disrupts Ingram Micro's Operations Amid Probe

In recent times, a new adversary has crept into the landscapes where businesses navigate—the ransomware attacker. Even the giants of the technological world find themselves not immune as they grapple with breaches that disrupt their operational rhythm. Technology powerhouse Ingram Micro stands as

Trojanized SonicWall VPN App Steals Users' Sensitive Data
Identity & Access Management Trojanized SonicWall VPN App Steals Users' Sensitive Data

In the ever-persistent battle against cybercrime, a recent incident has once again spotlighted the vulnerabilities faced by software users worldwide. Attackers have successfully tampered with SonicWall's NetExtender VPN application to craft a trojanized version that stealthily siphons off sensitive

How Can Companies Defend Against Scattered Spider's Threat?
Identity & Access Management How Can Companies Defend Against Scattered Spider's Threat?

The cybercriminal group known as Scattered Spider poses an increasingly potent threat as it diversifies its targets across various industries using refined phishing and ransomware tactics. This shifting landscape is underscored by the revelation of over 500 phishing domains assimilated into their

AI's Phishing Threat: Exploiting Hallucinations in LLMs
Security Operations & Management AI's Phishing Threat: Exploiting Hallucinations in LLMs

Is your AI-generated information as safe and accurate as you believe? This seemingly straightforward question unveils a complex reality where artificial intelligence (AI) becomes both a tool and a threat, especially concerning large language models (LLMs). These sophisticated systems can generate

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later