Beware: Business Email Compromise (BEC) Attacks Threaten Organizations
The pandemic has spurred significant shifts in business models. With the rise of digital transformation, [...]
The pandemic has spurred significant shifts in business models. With the rise of digital transformation, [...]
A new Linux variant of Bifrost, called Bifrose, was detected employing a clever evasion tactic [...]
Cybercriminals are leveraging the flexibility of SVG (Scalable Vector Graphics) files for the dissemination of [...]
Cyber adversaries utilize ZIP files as a means to weaponize them, leveraging the ease of [...]
Recent discoveries by Phylum indicate that a series of counterfeit npm packages identified on the [...]