In recent years, PDFs emerged as a primary vector for attack chains, with threat actors exploiting their ubiquity and complexity to deliver malware...
Vous n'êtes pas connecté
In recent years, PDFs emerged as a primary vector for attack chains, with threat actors exploiting their ubiquity and complexity to deliver malware through sophisticated social engineering tactics. Recognizing this escalating threat, Check Point introduces PDFguard, an advanced AI engine…
In recent years, PDFs emerged as a primary vector for attack chains, with threat actors exploiting their ubiquity and complexity to deliver malware...
A sophisticated cyberattack campaign targeting the Tibetan community has emerged, with China-aligned threat actors deploying advanced malware through...
Cybercriminals are increasingly exploiting the widespread fascination with artificial intelligence tools, leveraging the popularity of platforms like...
Cybercriminals are increasingly exploiting the widespread fascination with artificial intelligence tools, leveraging the popularity of platforms like...
In a recent discovery by the CYFIRMA research team, a sophisticated malware campaign dubbed Odyssey Stealer has been uncovered, targeting macOS users...
In a recent discovery by the CYFIRMA research team, a sophisticated malware campaign dubbed Odyssey Stealer has been uncovered, targeting macOS users...
Russia-linked group APT28 uses Signal chats as an attack vector to phish Ukrainian officials with new malware strains. Russia-linked cyberespionage...
A major cybersecurity threat has emerged in North America’s aviation sector as a well-known cybercriminal group called Scattered Spider successfully...
A major cybersecurity threat has emerged in North America’s aviation sector as a well-known cybercriminal group called Scattered Spider successfully...
The sector's growing digital complexity demands smarter collaboration to address digital threats in Africa, say experts