Recognition highlights company’s leadership in Zero Trust for Code security using pre-execution behavioral intent ...
Crocodilus is the latest in a string of Android crypto malware built to steal your cryptoassets. Crocodilus is a sophisticated piece of malware that steals digital assets from Android devices. Named ...
On the heels of launching AI-scale malware detection, Varist today announced The Varist Community, a free forum where any user or SOC analyst can upload and scan files to spot and understand new ...
Hackers are using fake Google Play Store pages to spread an Android malware campaign in Brazil.
The Cybersecurity and Infrastructure Security Agency (CISA), in partnership with Sandia National Laboratories, has announced the release of Thorium, an automated, scalable malware and forensic ...
On March 28, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a Malware Analysis Report (MAR) on RESURGE malware, which is associated with the product Ivanti Connect Secure.
Cybersecurity researchers have discovered a new Android malware codenamed “Perseus” that can steal sensitive, high-value ...
Threat actors continue to exploit ToolShell to gain unauthorized access to on-premises SharePoint servers. On August 6, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a ...
When analysts at cybersecurity firm Zscaler were combing through their latest findings, they didn’t expect to uncover an entirely new malware strain, let alone one that executes GPU code. Dubbed ...
To help cyber defenders automate workflows at scale, the Cybersecurity and Infrastructure Security Agency (CISA) has announced its launch of a new file analysis platform. Named Thorium, the platform ...
We collaborate with the world's leading lawyers to deliver news tailored for you. Sign Up for any (or all) of our 25+ Newsletters. Some states have laws and ethical rules regarding solicitation and ...