In March and April 2024, the Ukrainian national cyber incident response team, CERT-UA, detected a significant cyberattack targeting the information and communication system (ICS) of a central executive body.
During forensic investigation, researchers identified a Windows-based server that had been repurposed as an unauthorized...
In a worrying escalation of cyber threats, Indian defense personnel have become the latest target of a sophisticated espionage campaign orchestrated by APT36, also known as Transparent Tribe a Pakistan-based cyber-espionage group.
According to recent findings by cybersecurity firm CYFIRMA, the group has launched...
A recent investigation has revealed a highly sophisticated spearphishing campaign in which North Korean hackers used GitHub, a prominent code-hosting platform, as a key part of their attack infrastructure.
The campaign, linked to the notorious DPRK-nexus threat group Kimsuky, demonstrates the evolving tactics of...
A recent investigation by cybersecurity experts at Field Effect Analysis has uncovered a targeted cyberattack leveraging the popular Zoom video conferencing platform as a vector for infostealer malware.
This sophisticated campaign is attributed to BlueNoroff, a North Korean state-sponsored hacking group, known for its...
WhatsApp is set to introduce a groundbreaking new feature called Message Summaries, designed to help users efficiently manage their communication overflow.
The feature leverages Meta AI technology to provide quick, private summaries of unread messages, addressing the common challenge of staying caught up in...
IBM has disclosed a critical security vulnerability in its WebSphere Application Server that could allow remote attackers to execute arbitrary code on affected systems.
The vulnerability, designated as CVE-2025-36038, was initially published on June 25, 2025, with a corrected CVE identifier issued the same...