No menu items!
No menu items!
More

    News

    Cross-Platform JavaScript Stealer Targets Crypto Wallets in New Lazarus Group Campaign

    Feb 05, 2025Ravie LakshmananCryptocurrency / Data Breach The North Korea-linked Lazarus Group has been linked to an active campaign that leverages fake LinkedIn job...

    Silent Lynx Using PowerShell, Golang, and C++ Loaders in Multi-Stage Cyberattacks

    Feb 05, 2025Ravie LakshmananThreat Intelligence / Malware A previously undocumented threat actor known as Silent Lynx has been linked to cyber attacks targeting various...

    Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts

    Feb 05, 2025Ravie LakshmananCybersecurity / Cloud Security Cybercriminals are increasingly leveraging legitimate HTTP client tools to facilitate account takeover (ATO) attacks on Microsoft 365...

    New Veeam Flaw Allows Arbitrary Code Execution via Man-in-the-Middle Attack

    Feb 05, 2025Ravie LakshmananVulnerability / Data Protection Veeam has released patches to address a critical security flaw impacting its Backup software that could allow...

    Key IT Vulnerability Management Trends 

    Feb 05, 2025The Hacker NewsVulnerability / Threat Detection As the cybersecurity landscape continues to evolve, proactive vulnerability management has become a critical priority for...

    AsyncRAT Campaign Uses Python Payloads and TryCloudflare Tunnels for Stealth Attacks

    Feb 05, 2025Ravie LakshmananMalware / Network Security A malware campaign has been observed delivering a remote access trojan (RAT) named AsyncRAT by making use...

    CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25

    Feb 05, 2025Ravie LakshmananVulnerability / Software Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added four security flaws to its Known...

    Malicious Go Package Exploits Module Mirror Caching for Persistent Remote Access

    Feb 04, 2025Ravie LakshmananVulnerability / Threat Intelligence Cybersecurity researchers have called attention to a software supply chain attack targeting the Go ecosystem that involves...

    North Korean Hackers Deploy FERRET Malware via Fake Job Interviews on macOS

    Feb 04, 2025Ravie LakshmananMalware / Cryptocurrency The North Korean threat actors behind the Contagious Interview campaign have been observed delivering a collection of Apple...

    Latest articles

    spot_imgspot_img