No menu items!
No menu items!
More

    News

    Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images

    Mar 31, 2025Ravie LakshmananData Theft / Website Security Threat actors are using the "mu-plugins" directory in WordPress sites to conceal malicious code with the...

    Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More

    Mar 31, 2025Ravie LakshmananThreat Intelligence / Cybersecurity Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or...

    Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine

    Mar 31, 2025Ravie LakshmananThreat Intelligence / Malware Entities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote...

    RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features

    Mar 30, 2025Ravie LakshmananVulnerability / Zero-Day The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that...

    New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials

    Mar 29, 2025Ravie LakshmananThreat Intelligence / Mobile Security Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that's primarily designed to target...

    BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability

    Mar 29, 2025Ravie LakshmananCybercrime / Vulnerability In what's an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated...

    Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMA

    Mar 28, 2025Ravie LakshmananOperational Technology / Vulnerability Cybersecurity researchers have disclosed 46 new security flaws in products from three solar inverter vendors, Sungrow, Growatt,...

    CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection

    Mar 28, 2025Ravie LakshmananEndpoint Security / Threat Intelligence Cybersecurity researchers are calling attention to a new sophisticated malware called CoffeeLoader that's designed to download...

    How Datto BCDR Delivers Unstoppable Business Continuity

    Long gone are the days when a simple backup in a data center was enough to keep a business secure. While backups store...

    Latest articles

    spot_imgspot_img