International

FIN7, FIN8, and Affiliates Leverage Ragnar Loader for Ongoing Access and Ransomware Activities

Understanding Ragnar Loader: A Sophisticated Malware Toolkit Used by Cybercriminals Ragnar Loader: The Evolving Threat in Malware Warfare By Ravie Lakshmanan | March 07, 2025 Cybersecurity...

Feedly’s New AI: Quickly Synthesize Threat Reports and Articles with High Precision

Streamline Threat Intelligence with Ask AI: Your Essential Tool for Rapid Analysis and Reporting Feedly Revolutionizes Cyber Threat Intelligence with AI-Powered Ask AI In a groundbreaking...

Trump’s Intelligence Chief Pressured to Declassify Information on Covert Surveillance Program

Senator Wyden and Advocacy Groups Push for Transparency Amid Expanding Government Surveillance Powers Senator Ron Wyden Sounds Alarm on Government Surveillance Expansion Senator Ron Wyden of...

MITRE Caldera Security Advisory Issues Warning About Critical Vulnerability

MITRE Caldera Faces Critical Remote Code Execution Vulnerability: Security Experts Urge Immediate Action Critical Security Advisory Issued for MITRE Caldera: RCE Vulnerability Exposed In a stark...

Karen Evans Named Executive Assistant Director of CISA

Karen Evans Appointed as Executive Assistant Director for Cybersecurity at CISA Karen Evans Appointed as New Cybersecurity Executive Director at CISA The Cybersecurity and Infrastructure Security...

Unpacking the Conflicts of Interest Surrounding DOGE and the Weekend Email Turmoil Involving Elon Musk

Conflict of Interest and Chaos: Elon Musk’s Impact on Federal Workforce Communication Chaos Erupts as Elon Musk’s Email Creates Turmoil Among Federal Workers In an unexpected...

Vulnerabilities Detected in 86% of Open Source Software Codebases

Unlocking Insights from the 2025 Open Source Security and Risk Analysis Report: Key Vulnerabilities and Best Practices Security Risks in Open Source Software: A Wake-Up...

New Malware Campaign Distributes Lumma and ACR Stealer via Cracked Software

Rising Threat of Information Stealers: New Malware Campaigns Exploit Cracked Software and MSC Files Cybersecurity Alert: Surge in Malware Campaigns Targeting Software Users Feb 24, 2025...

RadiAnt DICOM Viewer Vulnerability Poses Risk of MITM Attacks for Users

Heading for the <div> <h1>Critical Security Vulnerability Identified in Medixant’s RadiAnt DICOM Viewer</h1> New Cybersecurity Flaw Raises Alarms in Healthcare Sector A concerning cybersecurity vulnerability has emerged...

Organizing Malware Articles by STIX Categories

Leveraging AI for Enhanced Malware Intelligence: A 15-Second Overview Feedly Unveils AI Models to Combat Cyber Threats Across 22 Malware Categories In a groundbreaking move to...

Proposal for Cyber Conspiracy Modernization Act: Insights from a Cyber Expert

Bipartisan Effort to Combat Cybercrime: The Cyber Conspiracy Modernization Act (CCMA) and Its Implications for Security Researchers Bipartisan Effort to Tackle Cybercrime: Unveiling the Cyber...

Microsoft Discovers Advanced Obfuscation Techniques in New Variant of XCSSET macOS Malware

New XCSSET Variant Detected: Enhanced Features Make macOS Malware More Sophisticated Microsoft Uncovers New Variant of Apple’s XCSSET Malware Targeting Mac Users Feb 17, 2025 |...

Recent articles