Cybersecurity researchers at Cybereason's Global Security Operations Center (GSOC) have identified a sophisticated campaign in which threat actors exploit compromised WordPress websites to distribute malicious versions of the legitimate NetSupport Manager Remote Access Tool (RAT).
The attack, detected in May 2025, employs a multi-stage...
In a significant escalation of macOS cybersecurity threats, the notorious Atomic macOS Stealer (AMOS) has received a dangerous upgrade. For the first time, it is being deployed with an embedded backdoor.
Moonlock, the cybersecurity division of MacPaw, warns that this is the most sophisticated...
In a worrying escalation for enterprise IT security, the newly emerged ransomware group “BERT,” also tracked as Water Pombero, has begun targeting organizations across Asia, Europe, and the United States.
The group’s rapid adoption of multithreaded ransomware variants for both Windows and Linux, particularly...
A newly disclosed high-severity vulnerability in ServiceNow’s cloud platform, dubbed Count(er) Strike, could have allowed malicious actors to exfiltrate personally identifiable information, credentials, and other proprietary data from hundreds of tables with minimal access.
Discovered by Varonis Threat Labs in February 2024 and formally...
Arctic Wolf has identified a sophisticated cybersecurity threat targeting IT professionals through search engine optimization (SEO) poisoning and malvertising campaigns since early June 2025.
The campaign involves the distribution of Trojanized versions of popular legitimate IT tools, specifically PuTTY and WinSCP, through fake websites...
Brave Software has announced a significant development for privacy-conscious Android users by making its browser available through a dedicated F-Droid repository.
This strategic move offers users an alternative installation method that bypasses Google Play Store, addressing growing concerns about Big Tech's control over app...