
The mass compromise of the VoIP firm’s customers is the first confirmed incident where one software supply chain attack enabled another, researchers say.
The mass compromise of the VoIP firm’s customers is the first confirmed incident where one software supply chain attack enabled another, researchers say.
Generative AI is a tool, which means it can be used by cybercriminals, too. Here’s how to protect yourself.
The discovery of malicious encryptors for Apple computers could herald new risks for macOS users if the malware continues to evolve.
Plus: 119 arrested during a sting on the Genesis dark-web market, the IRS aims to buy an online mass surveillance tool, and more.
North Korean hackers appear to have used the corrupted VoIP software to go after just a handful of crypto firms with “surgical precision.”
Plus: A major new supply chain attack, Biden’s spyware executive order, and a hacking campaign against Exxon’s critics.
The White House is providing $25 million to Costa Rica, after giving Albania similar aid following aggression by hackers linked to Iran.
Evgenii Serebriakov now runs the most aggressive hacking team of Russia’s GRU military spy agency. To Western intelligence, he’s a familiar face.
Russia, North Korea, Iran, and China have been caught using fake profiles to gather information. But the platform’s tools to weed them out only go so far.
With victims refusing to pay, cybercriminal gangs are now releasing stolen photos of cancer patients and sensitive student records.