-
Threat Intelligence
Attackers Crafted Custom Malware for Fortinet Zero-Day
Researchers analyzing data associated with a recently disclosed zero-day vulnerability in Fortinet’s FortiOS SSL-VPN technology have identified a sophisticated new…
-
Threat Intelligence
Cybercriminals Target Telecom Provider Networks
The growing use of mobile devices for multifactor authentication increasingly has made telecom providers a juicy target for cybercrime. An…
-
Breaches
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
Ravie LakshmananFeb 24, 2026Threat Intelligence / Healthcare The North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed…
-
Breaches
Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity
Oct 16, 2024Ravie LakshmananEndpoint Security / Malware Threat actors are attempting to abuse the open-source EDRSilencer tool as part of…
-
Breaches
AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
A Russian-speaking, financially motivated threat actor has been observed taking advantage of commercial generative artificial intelligence (AI) services to compromise…
-
Breaches
Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026
The Hacker NewsFeb 20, 2026Cyber Insurance / Password Security With one in three cyber-attacks now involving compromised employee accounts, insurers…
-
Threat Intelligence
Name That Toon: Poker Hand
New year, new cartoon contest! We’re flushed with excitement, knowing our clever, cybersecurity-minded readers are going to come up with…
-
Threat Intelligence
New Coalfire Report Reveals CISOs Rising Influence
WESTMINSTER, Colo., Jan. 18, 2023 /PRNewswire/ — In partnership with the world-class Dark Reading research team, global cybersecurity pioneer Coalfire today unveiled its second…
-
Breaches
ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware
Ravie LakshmananFeb 20, 2026Malware / Threat Intelligence Cybersecurity researchers have disclosed details of a new ClickFix campaign that abuses compromised…
-
Breaches
BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration
Ravie LakshmananFeb 20, 2026Vulnerability / Cyber Attack Threat actors have been observed exploiting a recently disclosed critical security flaw impacting…