Sunday, May 3, 2026
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Cybersecurity News
Industry News
Expert Insights
Webinars
Learning Center
Topics
About
Sponsor
Articles by Topic:
Advanced Threat Protection
Lazarus Turns Recruitment Lures Into a Multi-Stage Intrusion Factory
January 02, 2026
Darktrace researchers say a newly identified BeaverTail variant represents a clear step forward in how Lazarus-linked operators are building malware and running campaigns. What started out as a simple JavaScript-based stealer has grown into a…
Read More >
Why Russian Hackers Are Abandoning Zero-Days for Misconfigurations
December 29, 2025
For years, elite state-backed hackers have been defined by their exploits. Zero-days were the calling card—rare bugs, complex chains, techniques that only a handful of teams could pull off. That image still dominates how many…
Read More >
China Hackers Exploit Citrix Gateway to Breach European Telecom
November 03, 2025
Cybersecurity programs typically focus on protecting core applications and digital assets. But what if the bad guys start targeting trusted defensive measures? This was the case as reported by Darktrace, a cybersecurity platform provider. Its…
Read More >
Chinese Hackers Target Diplomacy with Covert Email Breaches
October 12, 2025
With cyber risks on the rise, many state-aligned threat groups have either arrived on the scene or evolved to take advantage of vulnerabilities in the modern landscape. Palo Alto Networks’ threat intelligence and incident response…
Read More >
How SentinelOne Thwarted Cyber Espionage Attempts
June 28, 2025
SentinelOne recently revealed that it was the target of a failed cyber espionage operation carried out by China-linked threat actors. This case is a rare example where a cybersecurity firm itself became the focus of…
Read More >
KoSpy Unmasked: North Korea’s APT37 Expands Mobile Surveillance Operations
April 02, 2025
North Korea’s state-sponsored hackers have added a powerful new tool to their cyber arsenal. According to researchers at Lookout, a newly discovered Android spyware strain called KoSpy is actively being used to spy on mobile…
Read More >
How Volt Typhoon Infiltrated a Small US Power Grid
March 25, 2025
The threat group Volt Typhoon (also known as VOLTZITE) has been known to be active since 2021, representing an advanced persistent threat (APT) primarily to organizations in the United States. Alleged to be a Chinese…
Read More >
Salt Typhoon Exploits Seven-Year-Old Flaw to Breach Major U.S. Telecoms
March 13, 2025
In late 2024, it was confirmed that a cyber espionage campaign perpetrated by a highly sophisticated Chinese-based threat actor infiltrated at least eight major telecommunications companies. The attacks gained access to Call Detail Records used…
Read More >
Silk Typhoon Targets IT Infrastructure and Cloud Apps
March 11, 2025
The threat group known as Silk Typhoon has been active since the 2021 exploitation of zero-day vulnerabilities in Microsoft Exchange servers. The group has a diverse attack history, partly as a result of their opportunistic…
Read More >
A Precarious Pause: U.S. Halts Offensive Cyber Operations Against Russia
March 10, 2025
In a major policy shift, U.S. Defense Secretary Pete Hegseth has directed U.S. Cyber Command to cease offensive cyber operations targeting Russia. Framed as a diplomatic effort during ongoing negotiations over the Ukraine conflict, this…
Read More >
Inside the Four-Month Espionage Campaign by Suspected Chinese Threat Actors
January 16, 2025
In mid-2024, a large U.S. organization with sizeable operations in China was targeted by a persistent attack thought to originate from Chinese actors. The reported intrusion lasted four months, from April to August, with the…
Read More >
The Remcos RAT Trap: How Phishing Campaigns Are Exploiting Old Vulnerabilities for Remote Control
November 19, 2024
The manipulation of remote administration tools (RATs) for cyberattacks is on the rise, with bad actors evading security measures to exploit known vulnerabilities. The dangers here are many, as leveraging RATs grants attackers high levels…
Read More >
Proofpoint Expands Human-Centric Security with Normalyze DSPM Acquisition
November 13, 2024
Ensuring data security and compliance is increasingly difficult as organizations adopt multi-cloud computing environments. Data can reside on a device, in a SaaS application, in cloud-based storage, and in other locations. Many users have access…
Read More >
Protecting Democratic Institutions from Cyber Threats
October 03, 2024
Microsoft's latest initiative focuses on protecting democratic institutions from rising cyber threats. The effort includes providing cybersecurity resources, technology, and expertise to help governments and organizations defend against attacks aimed at undermining democratic processes. Microsoft's…
Read More >
Lawmakers Crack Down on CCP Influence in US Government Tech, Warn of Potentially 'Devastating' Cyber Attack
September 19, 2024
U.S. lawmakers are trying to curb the influence of the Chinese Communist Party (CCP) in U.S. political and business sectors. Legislation is being introduced to address concerns about Chinese investments and partnerships that may compromise…
Read More >
Subscribe for the Latest News
Webinars
Tuesday, May. 12
1pm ET / 10am PT
Scaling Code Security for Builders Beyond Developer-First
Wednesday, May. 13
1pm ET / 10am PT
Cyber Resilience in Action: How IBM and Index Engines Deliver a Detection-to-Recovery Pipeline
Wednesday, May. 27
1pm ET / 10am PT
Passwordless Authentication: A Practical Approach to Modernizing Access