Nitrogen ransomware’s ESXi encryptor corrupts its own public key, making file recovery impossible, even if victims pay.
A prolific initial access broker tracked as TA584 has been observed using the Tsundere Bot alongside XWorm remote access ...
ESET shares findings of its H2 2025 Threat Report based on its telemetry research, highlighting the ongoing impact of ...
With access to SIM, location data, and a preview of recent SMSes, attackers have everything they need for account takeover or ...
How AI and agentic AI are reshaping malware and malicious attacks, driving faster, stealthier, and more targeted ...
The threat actor has been compromising cloud environments at scale with automated worm-like attacks on exposed services and ...
“There is no direct attribution associated with the source IPs, though the activity is consistent with known malicious ...
Worm-driven TeamPCP campaign exploits Docker, Kubernetes, Redis, Ray, and React2Shell to build proxy infrastructure for data theft and ransomware.
Researchers at Huntress and Microsoft have shared findings from their analysis of a new SolarWinds Web Help Desk vulnerability.
How modern infostealers target macOS systems, leverage Python‑based stealers, and abuse trusted platforms and utilities to ...
Cybersecurity deserves better than blind trust. 909Select offers vetted freelance talent with zero-trust hiring built ...
CCI staff share recent surveys, reports and analysis on risk, compliance, governance, infosec and leadership issues. Share details of your ...