Six also charged in connection with booter services
Over 85% of Attacks Hide in Encrypted Channels
Zscaler reveals 20% increase in malicious use of encryption
Platforms Flooded with 144,000 Phishing Packages
NuGet, PyPi and npm inundated with malicious packages
Signed Microsoft Drivers Used in Attacks Against Businesses
In some cases, the threat actor’s intent was to ultimately provide SIM-swapping services
AgentTesla Remains Most Prolific Malware in November, Emotet and Qbot Grow
These are some of the key findings from the latest Check Point Research Most Wanted report
Apple Fixes Actively Exploited iPhone Zero-Day Vulnerability
The vulnerability could allow remote code execution (RCE) on a victim’s device
You?ve Crossed the Line ? Disturbing a Host?s Rest
Akamai researchers explore two new vulnerabilities that can be exploited to lead to denial-of-service attacks against container and session services.
New Google Tool Helps Devs Root Out Open Source Bugs
Free OSV-Scanner searches transitive dependencies
Loan Fee Fraud Surges by a Fifth as Christmas Approaches
FCA warns of pressure tactics as cost of living bites