When the Battlefield Goes Digital: A Boardroom Briefing on Conflict-Era Cyber Risk in the GCC HAWKEYE
Gremlin Stealer Evolves into Modular Threat with Advanced Evasion Capabilities Information Security Magazine
China-Linked Hackers Deploy New TencShell Malware Against Global Manufacturer Information Security Magazine
Undermining the trust boundary: Investigating a stealthy intrusion through third-party compromise Threat intelligence | Microsoft Security Blog
Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise Threat intelligence | Microsoft Security Blog
ATT&CK v19: The Defense Evasion Split, ICS Sub-Techniques, New AI & Social Engineering Coverage… MITRE ATT&CK® - Medium
First Public macOS Kernel Exploit on Apple M5 Prepared Using Mythos Preview in Five Days Cyber Security News