LofyGang Group Linked to Recent Software Supply Chain Attacks
The group focuses on utilizing open-source software for malicious purposes
More results...
The group focuses on utilizing open-source software for malicious purposes
Investigators said they identified 22 sites used as torture rooms by Russian troops.
In a joint advisory, three US agencies, NSA, CISA and FBI, warned about Chinese threat actors
The insurance market has detected “unusual activity” and turned off its systems
CEOs put cybersecurity seventh behind near-term risks such as the economy and potential recession
Stay one step ahead of bad actors this holiday season with best practices to detect and mitigate attacks.
False narratives will try to sow doubt over outcome of election
Fake apps led to account takeovers and spam campaigns
Cypro-thieves target popular cross-chain bridging service
Recall NAFO making fun of a Russian blogger who asked “What air defense doing” after Ukraine attacked Saky airfield in August? In Topwar.ru this week, Roman Skomorokhov essentially asked “What Russian Army doing?” He stridently criticizes the high-level decision-making and … Continue reading