A comprehensive survey of over 1,000 security and IT leaders worldwide reveals a stark reality: 59 percent report experiencing an increase in AI-powered attacks, marking a significant shift in the cybersecurity landscape.
These sophisticated threats, which leverage artificial intelligence and machine learning algorithms, execute...
As of early July 2025, security analysts at IBM X-Force are reporting an ongoing wave of sophisticated cyberattacks launched by the Russian-aligned threat actor Hive0156.
Targeting Ukrainian government offices and military personnel, Hive0156 is deploying the Remcos Remote Access Trojan (RAT) to gain persistent...
Cybersecurity researchers have identified a significant escalation in phishing campaigns utilizing sophisticated domain spoofing techniques that mimic Microsoft SharePoint services.
The threat activity, which began intensifying on June 26, 2025, employs structured naming patterns and leverages legitimate hosting platforms to evade detection while harvesting...
Arctic Wolf Labs has identified a sophisticated cyber-espionage campaign by the Dropping Elephant APT group targeting Turkish defense contractors, specifically a manufacturer of precision-guided missile systems.
The campaign showcases a significant technical evolution from the group's previous operations, employing a five-stage execution chain that...
The Federal Bureau of Investigation has issued a stark warning about "Hacker Com," a sophisticated subset of an international cybercriminal ecosystem known as "The Com" that poses escalating threats to both digital infrastructure and physical safety.
This primarily English-speaking network comprises multiple interconnected groups...
Ukrainian cybersecurity authorities have identified what experts believe to be the first malware campaign that directly integrates large language model (LLM) capabilities into its attack methodology.
The malware, dubbed LAMEHUG, was discovered by Ukraine's Computer Emergency Response Team (CERT-UA) and represents a significant evolution...