


TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns
Read More Cybersecurity researchers have flagged the tactical similarities between the threat actors behind the RomCom RAT and a cluster that has been observed delivering a loader dubbed TransferLoader. Enterprise security firm Proofpoint is tracking the activity...
New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status
Read More A new study of integrated development environments (IDEs) like Microsoft Visual Studio Code, Visual Studio, IntelliJ IDEA, and Cursor has revealed weaknesses in how they handle the extension verification process, ultimately enabling attackers to execute...
A New Maturity Model for Browser Security: Closing the Last-Mile Risk
Read More Despite years of investment in Zero Trust, SSE, and endpoint protection, many enterprises are still leaving one critical layer exposed: the browser. It’s where 85% of modern work now happens. It’s also where copy/paste actions, unsanctioned GenAI usage,...