Scroll down for all the latest threat intelligence news and articles.
Subscribe to our weekly newsletter for the latest in industry news, expert insights, dedicated information security content and online events.
Tim Freestone says the combination of military-grade technologies with regulated industries is as a compelling avenue for fortifying digital defenses
Kaspersky said access control weaknesses and failures in data protection accounted for 70% of all flaws
The threat actor uses custom Linux malware to pursue financial gain, according to Check Point Research
Proofpoint said TA4903 adopted new tactics, including lure themes referencing confidential docs and ACH payments
Sekoia.io observed developments in the group’s DDoS tools, including updates enhancing compatibility with different processor architectures and OS
Proofpoint warned the method could be used for data gathering and further malicious activities