
Lumma infostealer infected about 10 million systems before global disruption
Cybercriminals used the prolific malware to target individuals and businesses, including Fortune 500 companies, according to the FBI.
Cybercriminals used the prolific malware to target individuals and businesses, including Fortune 500 companies, according to the FBI.
Experts tell CyberScoop that the U.S. telecom system is just too technologically fragmented to gather a clear picture of threats, and too big to ever fully eject all espionage efforts.
Multiple firms are tracking the zero-day attacks on Europe’s top software firm.
A new report from DTEX Systems is the deepest look at how North Korea’s remote IT workforce schemes are the tip of the iceberg when it comes to its cyber operations.
Researchers aren’t aware of active exploitation in the wild, but they warn the risk for publicly exposed and unpatched Ingress Nginx controllers is extremely high.
The Chinese state-backed espionage group started targeting third-party IT services in late 2024, Microsoft researchers said.
ThreatLocker CEO Danny Jenkins emphasizes the importance of limiting local administrator privileges. He also advocates for Enterprise Privilege Management (EPM) solutions and effective user communication to balance security with productivity.
The vulnerability, found in versions of Four-Faith routers, appears to have been exploited in the wild and has been connected to attempted infections of Mirai.
Flax Typhoon targeted critical infrastructure in the U.S. and abroad, and Black Lotus Labs researchers observed a “large scanning effort” targeting U.S. military and government.
The watchdog said the agency lacks “cybersecurity-related goals, objectives, activities, and performance measures.”