Mashreq CISO Olivier Busolini tells Infosecurity how the modern CISO role must evolve from protection to business enablement ...
The analyst predicted that subscriber losses to smishing, account takeover and other cyber-threats will shrink from $80bn in ...
It claimed that, during the period, 239 malware-laden apps bypassed Google’s filters to end up on the Play store, where they ...
Scattered Spider, ShinyHunters and LAPSUS$ have formed an enhanced coordinated threat network for extortion efforts ...
French prosecutors opened a judicial investigation on June 4, 2025, allowing law enforcement to deploy the operation. The ...
Instead of relying on more traditional methods, the backdoor exploits OpenAI’s Assistants API for command-and-control ...
Threat actors are increasingly using trusted, legitimate tools to hide malicious activity, with 84% of high-severity attacks now leveraging LotL ...
“The cloud’s greatest strength – on-demand infrastructure deployments – is also a source of systemic risk. In the race for ...
One of Ethereum’s leading decentralized finance (DeFi) protocols has suffered a major cyber-attack, resulting in ...
According to Acronis Threat Research Unit (TRU) researchers, DragonForce uses the same ChaCha20 and RSA encryption ...
Since January 2024, over 2100 victims across Europe were named on extortion leak sites, with 92% involving file encryption ...
Ukrainian national Oleksii Oleksiyovych Lytvynenko has appeared in a US court in connection with Conti ransomware charges ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results