Following its Salesforce attacks last year, the cybercrime group has broadened its targeting and gotten more aggressive with extortion tactics.
This is Part 2 of our two-part technical analysis on the Gopher Strike and Sheet Attack campaigns. For details on the Gopher Strike campaign, go to Part 1.IntroductionIn September 2025, Zscaler ...
Mandiant says a wave of recent ShinyHunters SaaS data-theft attacks is being fueled by targeted voice phishing (vishing) attacks and company-branded phishing sites that steal single sign-on (SSO) ...
ESET researchers present technical details on a recent data destruction incident affecting a company in Poland’s energy sector.
From Russian GRU operations to Chinese espionage campaigns, AI is transforming cyber warfare. But that change is a bit more ...
Check before you click. ShinyHunters is leading surge in extortion attacks using vishing to grab SSO and MFA credentials and steal data from the cloud.
This week’s cybersecurity recap highlights key attacks, zero-days, and patches to keep you informed and secure.
Have you ever been given an application and instructed to run it on various computers and systems, only to realize that it wasn’t built for multiple hosts? After all, some apps are designed to be ...
How modern infostealers target macOS systems, leverage Python‑based stealers, and abuse trusted platforms and utilities to ...
ESET researchers discover an Android spyware campaign targeting users in Pakistan via romance scam tactics, revealing links to a broader spy operation.
Images circulating online that show New York City Mayor Zohran Mamdani as a child with millionaire financier and sex offender Jeffrey Epstein are generated by artificial intelligence.
A hands-on test compared Visual Studio Code and Google Antigravity on generating and refining a simple dynamic Ticket Desk ...