Post-Quantum Security News Center

Your source for the latest in zero trust architecture, quantum-resistant technologies, and next-gen cybersecurity for distributed networks.

Interlock Ransomware Adopts FileFix Attack for Malware Delivery

Discover how the new FileFix attack exploits Windows File Explorer to deploy the Interlock RAT. Learn to protect your organization today!

By Edward Zhou 4 min read
Read full article

Defending Against DeepSeek: Legal Protections for Tech Firms

Learn how Congress is tackling national security threats posed by China's DeepSeek AI. Discover the implications for U.S. cybersecurity.

By Alan V Gutnov 3 min read
Read full article

Phishing Techniques Bypass Security Keys: New Risks Unveiled

Discover a new phishing technique that bypasses FIDO keys, exposing user accounts to cybercriminals. Stay informed and secure your data.

By Alan V Gutnov 4 min read
Read full article

Godfather Malware: A New Threat to Android Banking Apps

Discover the Godfather malware threat targeting banking apps. Learn how to protect your financial data from this sophisticated trojan.

By Edward Zhou 3 min read
Read full article

New Phishing Technique Bypasses FIDO MFA, Endangers Security

Discover the latest phishing techniques targeting FIDO security and learn how to protect your organization. Stay secure with our expert insights!

By Alan V Gutnov 3 min read
Read full article

Emerging Cyber Threats: Brands Navigate a Treacherous Landscape

Stay ahead of evolving cyber threats with Gopher Security's advanced AI solutions. Discover the latest trends and protect your organization today!

By Edward Zhou 3 min read
Read full article

Russian Cyber Espionage: APT28, Secret Blizzard, and New Threats

Discover how Russian threat actors exploit Microsoft 365 credentials with espionage malware. Learn strategies for enhanced cybersecurity today!

By Edward Zhou 2 min read
Read full article

Veeam Phishing Attack: Weaponized WAV File Targets Users

Discover how cybercriminals are exploiting user trust with a new Veeam-themed phishing attack using weaponized WAV files. Stay informed and secure!

By Edward Zhou 4 min read
Read full article

Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Attack

Google takes legal action against 25 individuals in China for their role in the BadBox 2.0 botnet. Discover how to protect against cyber threats.

By Edward Zhou 3 min read
Read full article