This year, the financial sector navigated a rapidly evolving cyber landscape, with malware spreading through messaging apps, AI-assisted attacks, supply chain compromises, and NFC-based...
While investigating ForumTroll, researchers identified that the attackers used a spyware LeetAgent, which stood out due to its commands written in leetspeak, a rare...
Based on the latest Kaspersky Industrial Control Systems Cyber Emergency Response Team (ICS CERT) report, the Southeast Asia cluster recorded the highest global rates...
The Philippines’ the Cybercrime Investigation and Coordinating Center (CICC) has recently raised alarm over the proliferation of deepfakes, particularly AI-generated pornographic content. The call...
This enhancement introduces External Attack Surface Management (EASM) capabilities, giving security teams the visibility and control they need to stay ahead of cyber adversaries...
At the heart of this technological shift lies a powerful and double-edged capability: quantum computers could eventually break many of today’s encryption methods, raising...
These malicious apps, often Trojan bankers, are designed to look and function like legitimate utilities such as mobile banking apps, government service portals, e-wallets,...
The malicious open-source packages are extensions hosted in the Open VSX repository that claim to provide support for the Solidity programming language. However, in...