No menu items!
No menu items!
More

    THN

    Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers

    Apr 27, 2025Ravie LakshmananKubernetes / Cloud Security Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying attacks against...

    ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion

    Apr 26, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been observed...

    North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures

    North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during the fake hiring...

    Why NHIs Are Security’s Most Dangerous Blind Spot

    When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA prompt. But lurking beneath the surface...

    SAP Confirms Critical NetWeaver Flaw Amid Suspected Zero-Day Exploitation by Hackers

    Apr 25, 2025Ravie LakshmananVulnerability / Enterprise Security Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with...

    DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks

    Apr 25, 2025Ravie LakshmananVulnerability / Network Security Cybersecurity researchers are warning about a new malware called DslogdRAT that's installed following the exploitation of a...

    Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers

    Apr 25, 2025Ravie LakshmananVulnerability / Data Breach Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully...

    Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals

    Apr 24, 2025Ravie LakshmananPhishing / Cybercrime The threat actors behind the Darcula phishing-as-a-service (PhaaS) platform have released new updates to their cybercrime suite with...

    Linux io_uring PoC Rootkit Bypasses System Call-Based Threat Detection Tools

    Apr 24, 2025Ravie LakshmananEndpoint Security / Linux Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism...

    Latest articles

    spot_imgspot_img