Hackers Weaponize Remote Tools to Hijack Cargo Freight
Researchers uncovered a new threat campaign in which attackers use RMM tools to steal physical cargo out of the supply chain.
Researchers uncovered a new threat campaign in which attackers use RMM tools to steal physical cargo out of the supply chain.
Companies left them for dead, but the remnants of old infrastructure and failed projects continue to haunt businesses’ security teams.
Researcher Gjoko Krstic’s “Project Brainfog” exposed hundreds of zero-day vulnerabilities in building-automation systems still running hospitals, schools, and offices worldwide.
The agreement aims to help law enforcement prosecute cross-border cybercrime, but the final treaty could allow unchecked surveillance and human-rights abuses, critics say; and, it
CVE-2025-54603 gave attackers an opening to disrupt critical operational technology (OT) environments and critical infrastructure, plus steal data from them.
In the “PhantomRaven” campaign, threat actors published 126 malicious npm packages that have flown under the radar, while collecting 86,000 downloads.
How the best security training programs build strong security culture by focusing on high-risk groups like developers, executives, finance pros and more.
Africa becomes a proving ground for AI-driven phishing, deepfakes, and impersonation, with attackers testing techniques against governments and enterprises.
Development teams that fail to create processes around AI-generated code face more technical and security debt, as vulnerabilities get replicated.
Security analyst Michael Robinson spent 14 months mining thousands of legal filings to uncover who malicious insiders really are, how they operate, and why traditional