The infamous Predator mobile spyware operation publicly exposed in an eye-popping report last year by Amnesty International has revamped its malware delivery network and...
North Korean hackers integrate AI into cyberattacks, leveraging generative AI for phishing and social engineering, posing new challenges.
Notably, the cybercriminals are using artificial intelligence...
A researcher at Swedish telecom and cybersecurity firm Enea has unearthed a previously unknown tactic that Israel's NSO Group has made available for use...
Cyber threat actors linked with Hamas have seemingly ceased activity ever since the terrorist attack in Israel on Oct. 7, confounding experts.Combination warfare is...
Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...
ESET Research An AI chatbot inadvertently kindles a cybercrime boom, ransomware bandits plunder organizations without deploying ransomware, and a new botnet enslaves Android...
Cyberattackers have installed the Pegasus spyware on the phones of multiple journalists in the African country of Togo.According to Reporters Without Borders, the spyware...
Apple has patched an actively exploited zero-day bug in its WebKit browser engine for Safari.The bug, assigned as CVE-2024-23222, stems from a type confusion...
A previously undocumented hardware feature within Apple's iPhone System on a Chip (SoC) allows for exploitation of multiple vulnerabilities, eventually letting attackers bypass hardware-based...