Fake movie torrents deliver multi-stage malware without the user noticing execution stepsAgentTesla steals browser, email, FTP, and VPN credentials silently and efficientlyMalicious PowerShell scripts ...
Transparent Tribe (APT36) is linked to new cyber-espionage attacks using malicious LNK files, adaptive RATs, and long-term ...
Microsoft is moving to disable RC4, an encryption cipher embedded in Windows authentication for more than two decades. The decision follows years of documented abuse, repeated warnings from security ...
Cybercriminals are exploiting demand for pirated movies by disguising malware as a fake torrent of “One Battle After Another, ...
A fourth wave of the "GlassWorm" campaign is targeting macOS developers with malicious VSCode/OpenVSX extensions that deliver ...
Attackers are exploiting a Flight protocol validation failure that allows them to execute arbitrary code without ...
Some stories, though, were more impactful or popular with our readers than others. This article explores 15 of the biggest ...
The first ThreatsDay Bulletin of 2026 tracks GhostAd adware, macOS malware, proxy botnets, cloud exploits, and more emerging ...
December 2025 was a brutal reality check for security teams. While most were winding down for the holidays, threat actors weaponized a tectonic shift in the landscape, headlined by the... The post Top ...
What cyber trends and predictions are coming for 2026? Here’s your annual security industry prediction report roundup for the ...
The leaked internal chat communications of the Black Basta ransomware group offer an unprecedented view into how cybercriminals operate, plan attacks, and ...
Discover the top ten threat intelligence tools that every enterprise needs in 2025 to secure their operations efficiently. Learn about their features, integrations, and pricing models to make the best ...