
Predator spyware activity surfaces in new places with new tricks
The spyware’s developer, Intellexa, has been under pressure due to sanctions and public disclosure, but Recorded Future uncovered fresh activity.
The spyware’s developer, Intellexa, has been under pressure due to sanctions and public disclosure, but Recorded Future uncovered fresh activity.
In a new CyberScoop video interview, Trinity Cyber’s Mike Denning explains how Full Content Inspection is redefining cyber defense by surgically removing threats from network traffic, not just blocking them.
The domino effect of CVE disruption is something all cybersecurity practitioners must be aware of, a Morphisec executive argues.
The Philippines-based company Funnull operated a large cybercrime platform encompassing more than 332,000 domains, the FBI said.
Cryptography experts said a “Cambrian explosion” of standards is on its way as a response to worries over quantum computers breaking current algorithms.
Greg talks with Alexander Leslie, Threat Intelligence Analyst for Recorded Future’s Insikt Group
Lawmakers say the ROUTERS Act is critical to understanding vulnerabilities in devices exploited by Chinese hackers and other adversaries.
The genetic testing business says user privacy will be an “important consideration” as it searches for a buyer.
In 1999, Dave Mann and Steve Christey, two researchers from the nonprofit R&D corporation MITRE, debuted a concept for security vulnerabilities that laid the groundwork for the common vulnerability and exposures framework (CVE) that organizes information around computer vulnerabilities. Twenty-five years later, the CVE program, which assigns a unique record to each reported vulnerability, is […]
Inexpensive information-stealing malware surged in 2024, infecting 23 million hosts, according to Flashpoint.