"Living Off the Land" attacks use built-in tools and processes instead of traditional malware.
Fake CAPTCHA attacks spiked by 563% last year: How to spot them before it's too late ...
As enterprises increasing depend on cloud services, living off the land has evolved into living off the cloud.
The Russian state-sponsored APT28 threat group is using a custom variant of the open-source Covenant post-exploitation framework for long-term espionage operations.
A new ClickFix attack variant uses fake CAPTCHA pages instructing victims to paste and execute malicious commands in Windows Terminal.
Performance-enhancing peptides are increasingly popular among fitness enthusiasts and biohackers, despite limited human ...
APT28 deploys BEARDSHELL and COVENANT since April 2024 targeting Ukrainian military, enabling cloud-based espionage and persistent surveillance.
Plus: A porn-quitting app exposed the masturbation habits of hundreds of thousands of users, Russian hackers are trying to take over people’s Signal accounts, and more.
ESET researchers document how the Sednit APT group has reemerged with a modern toolkit centered on two paired implants – BeardShell and Covenant.
During the unprecedented escalation of the current 2026 cyber and kinetic war involving Iran, Israel and the United States, understanding the adversary's playbook is more critical than ever.
State-backed cyber threat actors from non-combatant states are taking advantage of the Israeli-US war on Iran to fulfil their own goals, according to Proofpoint analysts.
Clickfix attacks surged 500% in early 2025. Cybercriminals now use AI in BEC scams. AI is making phishing harder to detect. Cybercriminals are shifting their techniques to focus on the human element, ...