Articles
7 articles
CanisterWiper Worm Targets Iran via Misconfigured Cloud Storage
A criminal group deployed the self-propagating CanisterWiper malware against Iranian entities, exploiting misconfigured cloud storage to spread and destroy data.
Google DBSC in Chrome 146 Blocks Session Hijacking Attacks
Google's Device Bound Session Credentials (DBSC) in Chrome 146 cryptographically binds session cookies to devices, neutralizing infostealing malware that steals cookies to hijack accounts.
APT28 Blends Simple Router Hacks with Sophisticated Malware
In the shadowy world of state-sponsored cyber espionage, a new campaign blurs the line between sophisticated malware and shockingly simple intrusion. The Russian threat actor tracked as APT28 (als
New Mac Malware Threats Bypass Apple Security
A new wave of sophisticated malware campaigns is converging on macOS, leveraging clever social engineering and novel technical methods to bypass Apple’s security measures. Security researchers have id
Russian APT28 Hijacks Routers in Global Spy Campaign
In a stark reminder that sophisticated state-sponsored espionage doesn't always require complex malware, Russia's notorious APT28 threat group is executing a global surveillance campaign by weapon
LockBit 4.0 Targets Healthcare Sector with New Evasion Techniques
LockBit 4.0 operators have launched a coordinated campaign against healthcare organizations in North America and Europe, deploying updated ransomware with improved EDR evasion and a new double-extortion portal.
GPT-5 Release: Security Implications for Enterprise Defenders
OpenAI's GPT-5 raises the bar for AI-assisted cyberattacks — spear-phishing at scale, automated exploit generation, and deepfake social engineering. Here's what security teams need to know and do.