A sophisticated malware campaign targets Android users by abusing the trusted AI platform Hugging Face to host and distribute malicious…
Read More »Bitdefender
Entity category: organization
Mustang Panda has deployed an updated CoolClient backdoor with enhanced capabilities to steal browser credentials and clipboard data, targeting government…
Read More »AI-powered scams are becoming more convincing and harder to detect, with deepfake technology now a primary concern for many individuals.…
Read More »An international law enforcement effort led by Europol and Eurojust dismantled over 1,000 servers used by major malware families like…
Read More »Threat actors increasingly use legitimate organizational tools through Living-off-the-Land (LotL) techniques, with 84% of modern cyberattacks exploiting trusted applications to…
Read More »The Russian cyber-espionage group Curly COMrades uses Microsoft's Hyper-V to hide malware in concealed Linux virtual machines, evading standard security…
Read More »YouTube's massive user base and algorithmic design are exploited by scammers to spread malware, hijack accounts, and run fraudulent schemes…
Read More »Insecure domestic solar power systems pose a new threat to national electricity grids, as vulnerable control devices could be manipulated…
Read More »The average household now contains 22 connected devices and faces nearly 29 daily cyberattacks, a nearly threefold increase from the…
Read More »Modern homes face nearly triple the daily cybersecurity attacks compared to last year, with households averaging 22 connected devices and…
Read More »Bitdefender and CYPFER have partnered to provide end-to-end cyber resilience, integrating incident response, forensic investigation, and rapid recovery into Bitdefender's…
Read More »Bitdefender has launched GravityZone PHASR as a standalone solution, enabling businesses to add advanced pre-emptive protection to their existing security…
Read More »Bitdefender has renewed its exclusive worldwide cybersecurity partnership with Scuderia Ferrari HP, reinforcing their shared values of innovation, excellence, and…
Read More »AI-powered scams using deepfake video and voice cloning technology are becoming highly sophisticated, posing significant financial and emotional risks by…
Read More »A malvertising campaign has expanded from Facebook to Google Ads, using fake offers of free TradingView Premium to distribute advanced…
Read More »Attackers increasingly use "Living off the Land" (LOTL) techniques, leveraging legitimate system tools like PowerShell to blend malicious activities with…
Read More »The cybersecurity landscape is evolving with new AI-powered solutions like Darwinium's Beagle and Copilot, which simulate attacks and expose vulnerabilities…
Read More »Authorities dismantled the BlackSuit ransomware group's dark web infrastructure in a global operation, with a seizure notice displayed on their…
Read More »PlexTrac's upgraded Workflow Automation Engine enhances vulnerability management by standardizing processes, automating penetration test findings, and reducing remediation time for…
Read More »Law enforcement dismantled BlackSuit ransomware's online infrastructure in Operation Checkmate, seizing dark web domains and replacing them with seizure notices.…
Read More »


















