Feb 18, 2025Ravie LakshmananCyber Espionage / Malware
The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing a novel technique to...
Feb 18, 2025Ravie LakshmananMalware / Network Security
The China-linked threat actor known as Winnti has been attributed to a new campaign dubbed RevivalStone that...
Feb 18, 2025Ravie LakshmananThreat Intelligence / Malware
Cybersecurity researchers are alerting to a new campaign that leverages web injects to deliver a new Apple...
Feb 18, 2025The Hacker NewsArtificial Intelligence / Cyber Defense
Is AI really reshaping the cyber threat landscape, or is the constant drumbeat of hype...
Feb 18, 2025Ravie LakshmananVulnerability / Enterprise Security
Security vulnerabilities have been disclosed in Xerox VersaLink C7025 Multifunction printers (MFPs) that could allow attackers to...
Feb 18, 2025Ravie LakshmananMalware / Website Hacking
Cybersecurity researchers have flagged a credit card stealing malware campaign that has been observed targeting e-commerce sites...
Feb 17, 2025Ravie LakshmananEndpoint Security / Malware
Microsoft said it has discovered a new variant of a known Apple macOS malware called XCSSET as...
Feb 17, 2025Ravie LakshmananThreat Intelligence / Cyber Attack
Cybersecurity researchers have shed light on a new Golang-based backdoor that uses Telegram as a mechanism...