Critical Vulnerability in DELMIA Apriso Factory Software Exploited in Attacks

Cybersecurity authorities have raised alarms over a critical vulnerability affecting DELMIA Apriso, a widely used [...]

France Reports Apple Warned Users About New Spyware Attacks

According to the French government, Apple has alerted several individuals that their devices may have [...]

Attackers Adopt Novel LOTL Techniques to Evade Detection

Threat actors are increasingly chaining living-off-the-land (LOTL) techniques and abusing less obvious file types to [...]

New HybridPetya Ransomware Bypasses UEFI Secure Boot via CVE-2024-7344

Cybersecurity researchers have uncovered a new ransomware strain called HybridPetya, which resembles the infamous Petya/NotPetya [...]

From a Simple “Like” to Financial Ruin: A Real-Life Scam Story

We often hear about people falling victim to scams, losing money, and facing devastating consequences. [...]

Akira Ransomware Exploits Year-Old SonicWall Vulnerability

Cybersecurity researchers have reported that the Akira ransomware group is actively exploiting a year-old vulnerability [...]

Fileless Malware Uses Legitimate Tools to Deploy Advanced RAT

Cybersecurity researchers have uncovered a sophisticated fileless malware campaign that leverages legitimate system tools to [...]

UK Students Drive Majority of School Cybersecurity Breaches, ICO Warns

The UK’s Information Commissioner’s Office (ICO) has revealed a concerning trend: students are responsible for [...]

Google Pixel 10 Introduces C2PA Support for Verifying AI-Generated Media

Google has announced that its new Pixel 10 smartphones will natively support the Coalition for [...]

Fake BMV Texts Target Victims With Phishing and Identity Theft

Cybercriminals are currently running a phishing campaign disguised as messages from the Bureau of Motor [...]