Google's got a new report out on Gemini misuse, identifying the way that state-sponsored groups have been taking advantage of the tool.
This glossary includes the most common terms and expressions TechCrunch uses in our security reporting, and explanations of ...
APT groups from China, Iran, North Korea, and Russia use AI for cyber operations, phishing, and reconnaissance, raising security concerns.
TorNet connects infected machines to the TOR network for command and control (C2) communications and detection evasion.
Annual email threat research predicts infostealer, BEC attacks, and AI-driven phishing and social engineering as persistent threats in 2025, alongside the use of QR codes, deepfakes, and synthetic ...
VIPRE Security Group, a global leader and award-winning cybersecurity, privacy, and data protection company, has released its annual email threat landscape report titled 'Email Security in 2025: What ...
PlushDaemon APT targets South Korean VPN with SlowStepper backdoor. Multistage DNS C&C protocol aids espionage.
ESET researchers uncovered a supply chain attack on a South Korean VPN by the China-aligned APT group PlushDaemon ...
AI, which was originally solely used for automation and optimization, now acts as both a shield and a sword in the field of ...
As cyber threats grow in sophistication, Japan faces mounting pressure to fortify its defences and adopt proactive ...
The US Treasury Department disclosed in December that it had fallen victim to a security breach involving a “China ...
While, of course, also emerging as a potential national security threat, according to U.S. officials. On April 24, President Joe Biden signed legislation requiring TikTok parent ByteDance to sell ...