In recent months, cybersecurity researchers have observed a surge in ransomware gangs weaponizing legitimate Remote Monitoring and Management (RMM) tools to compromise organizations and steal sensitive data.
For IT teams, RMM solutions are indispensable for remotely managing corporate systems yet that same trust and...
For over a year, a team of open-source intelligence (OSINT) researchers delved deep into the enigmatic network that is Russia’s FSB 16th Center, the successor to the Soviet KGB’s signals intelligence (SIGINT) apparatus.
This shadowy organization, officially known as the Center for Radio-Electronic Intelligence...
A sophisticated new ransomware-as-a-service operation called Chaos that emerged in February 2025, employing advanced social engineering tactics and legitimate tools to conduct big-game hunting attacks.
The group has demonstrated a concerning evolution in ransomware operations by combining traditional spam campaigns with voice-based manipulation techniques,...
A concerning vulnerability in Cursor's Background Agents that allowed them to gain complete control over the underlying Amazon EC2 infrastructure.
The incident, discovered two weeks after the agents' public release, highlights significant risks in modern SaaS applications that extend beyond traditional desktop boundaries.
The attack...
A routine investigation by security researchers at Assetnote has uncovered a series of critical vulnerabilities in Hexagon ETQ’s Reliance, an enterprise-grade quality management system deployed by thousands of organizations globally.
In a finding reminiscent of early 2000s web insecurities, researchers demonstrated how a single...
The Federal Bureau of Investigation has issued a stark warning about an evolving cybercriminal ecosystem called "Hacker Com," a sophisticated subset of the international threat group known as "The Com."
This primarily English-speaking network comprises multiple interconnected criminal organizations whose members, including many minors,...