New Mandrake Spyware Found in Google Play Store Apps After Two Years

A new iteration of a sophisticated Android spyware called Mandrake has been discovered in five applications that were…

The Power and Peril of RMM Tools

As more people work remotely, IT departments must manage devices distributed over different cities and countries…

Cybercriminals Target Polish Businesses with Agent Tesla and Formbook Malware

Cybersecurity researchers have detailed widespread phishing campaigns targeting small and medium-sized businesses (SMBs) in Poland during…

Evolve Bank Data Breach Impacts 7.6 Million People

Evolve Bank & Trust has sent notification to more than 7.6 million individuals that their personal…

SAP Patches High-Severity Vulnerabilities in PDCE, Commerce

Enterprise software maker SAP on Tuesday announced the release of 16 new and two updated security…

Ransomware Gang Leaks Data Allegedly Stolen from Florida Department of Health

The ransomware group known as RansomHub is leaking data allegedly stolen from the Florida Department of…

What is DevSecOps and Why is it Essential for Secure Software Delivery?

Traditional application security practices are not effective in the modern DevOps world. When security scans are…

Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor

Legitimate-but-compromised websites are being used as a conduit to deliver a Windows backdoor dubbed BadSpace under the guise…

NiceRAT Malware Targets South Korean Users via Cracked Software

Threat actors have been observed deploying a malware called NiceRAT to co-opt infected devices into a…

Rebranded Knight Ransomware Targeting Healthcare and Businesses Worldwide

An analysis of a nascent ransomware strain called RansomHub has revealed it to be an updated and rebranded…