News
"Overall, in Q2 2025, hyper-volumetric DDoS attacks skyrocketed," Omer Yoachimik and Jorge Pacheco said. "Cloudflare blocked ...
GLOBAL GROUP ransomware, launched in June 2025, targets industries across multiple regions with AI-powered negotiation and ...
A new state-backed campaign using HazyBeacon malware targets Southeast Asian governments to collect sensitive data via AWS ...
Discover how AsyncRAT evolved from GitHub release to a widespread malware tool, spawning dangerous variants like DCRat and ...
AI agents bring productivity but also identity risks in cloud environments. Learn how Astrix secures non-human identities.
North Korean hackers continue attacking open-source software via npm packages. 67 new malicious packages with XORIndex Loader ...
A fake CAPTCHA is all it takes. Interlock ransomware is back—now pushing a stealthy PHP RAT via “FileFix,” a spin on ClickFix ...
The JavaScript code acts as a traffic distribution system (TDS), using IP filtering techniques to redirect users to fake ...
Explore runtime reachability and why function-level execution is key to reducing false positives in vulnerability scanning.
CBI's Operation Chakra V dismantles a transnational tech support scam targeting UK, Australia. Over £390,000 lost in UK, two ...
Mergers bring risk from misaligned policies and redundant accounts. Learn how to secure your identity landscape effectively.
Furthermore, the vulnerability could facilitate the extraction of the Kigen eUICC identity certificate, thereby making it ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results