Blog

Blog
Leading Malware Threats: FakeUpdates, Remcos, and AgentTesla Dominate Stealth Attack Landscape

Check Point’s April 2025 malware report highlights an alarming trend characterized by the growing sophistication and obfuscation of cyberattacks. The…

Blog
Assessment of Hacktivist Threats to India in Context of APT36 Espionage Activities

A recent surge in reported hacktivist attacks against India’s digital infrastructure has raised concerns, with claims of over 100 breaches…

Blog
Moldova Detains Individual Associated with DoppelPaymer Ransomware Operations

Moldovan law enforcement agencies have successfully apprehended a 45-year-old suspect implicated in DoppelPaymer ransomware attacks that targeted Dutch entities in…

Blog
Criminal Proxy Network Compromises Thousands of IoT Devices

A criminal proxy network has been identified as infecting thousands of Internet of Things (IoT) and end-of-life (EoL) devices, repurposing…

Blog
#2025 Security Summit: Experts to Illuminate Vendor Supply Chain Resilience

The vendor supply chain comprises a complex ecosystem of hundreds, if not thousands, of third-party suppliers, presenting significant cybersecurity challenges…

Blog
ASUS Addresses Remote Code Execution Vulnerabilities in DriverHub Accessible through HTTP and Malicious .ini Files

ASUS has implemented security updates to rectify two critical vulnerabilities affecting the ASUS DriverHub software. These flaws, if successfully exploited,…