Mar 31, 2025Ravie LakshmananData Theft / Website Security
Threat actors are using the "mu-plugins" directory in WordPress sites to conceal malicious code with the...
Mar 31, 2025Ravie LakshmananThreat Intelligence / Malware
Entities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote...
Mar 30, 2025Ravie LakshmananVulnerability / Zero-Day
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that...
Mar 29, 2025Ravie LakshmananThreat Intelligence / Mobile Security
Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that's primarily designed to target...
Mar 29, 2025Ravie LakshmananCybercrime / Vulnerability
In what's an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated...
Mar 28, 2025Ravie LakshmananOperational Technology / Vulnerability
Cybersecurity researchers have disclosed 46 new security flaws in products from three solar inverter vendors, Sungrow, Growatt,...
Mar 28, 2025Ravie LakshmananEndpoint Security / Threat Intelligence
Cybersecurity researchers are calling attention to a new sophisticated malware called CoffeeLoader that's designed to download...