Apr 27, 2025Ravie LakshmananKubernetes / Cloud Security
Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying attacks against...
Apr 26, 2025Ravie LakshmananMalware / Vulnerability
Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed...
When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA prompt. But lurking beneath the surface...
Apr 25, 2025Ravie LakshmananVulnerability / Enterprise Security
Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with...
Apr 25, 2025Ravie LakshmananVulnerability / Network Security
Cybersecurity researchers are warning about a new malware called DslogdRAT that's installed following the exploitation of a...
Apr 25, 2025Ravie LakshmananVulnerability / Data Breach
Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully...
Apr 24, 2025Ravie LakshmananPhishing / Cybercrime
The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform have released new updates to their cybercrime suite with...
Apr 24, 2025Ravie LakshmananEndpoint Security / Linux
Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism...