
New cyber research connects the infamous North Korea-aligned Lazarus Group behind the Linux malware attack called Operation DreamJob to the 3CX supply-chain attack. In the company's April 20 Live Security cyber report,... Read more »

Online raiders are stealing IP addresses and converting them to cash by selling them to so-called proxyware services. Malicious actors are planting proxyware on computers without the owner's knowledge, then selling the... Read more »