"We have a security team, we do our own pentesting, we've got software scanners, we got a CSO ... Nonetheless, they outsmarted us."| CyberScoop
An attack that could be the work of the notorious Lazarus Group attempted to install infostealer malware inside corporate networks.| CyberScoop
Targets of the operation were given phony coding challenges that delivered a range of malware, including a previously-unseen backdoor.| CyberScoop
Two years after it was disclosed, the Log4j vulnerability continues to enable North Korean hacking operations.| CyberScoop