No menu items!
No menu items!
More

    THN

    Multi-Stage Malware Attack Uses .JSE and PowerShell to Deploy Agent Tesla and XLoader

    A new multi-stage attack has been observed delivering malware families like Agent Tesla variants, Remcos RAT, and XLoader. "Attackers increasingly rely on such complex...

    [Webinar] AI Is Already Inside Your SaaS Stack — Learn How to Prevent the Next Silent Breach

    Apr 18, 2025The Hacker NewsSaaS Security / Shadow IT Your employees didn't mean to expose sensitive data. They just wanted to move faster. So...

    Experts Uncover New XorDDoS Controller, Infrastructure as Malware Expands to Docker, Linux, IoT

    Apr 18, 2025Ravie LakshmananIoT Security / Malware Cybersecurity researchers are warning of continued risks posed by a distributed denial-of-service (DDoS) malware known as XorDDoS,...

    CVE-2025-24054 Under Active Attack—Steals NTLM Credentials on File Download

    Apr 18, 2025Ravie LakshmananWindows Security / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a medium-severity security flaw impacting Microsoft...

    Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates

    The China-linked threat actor known as Mustang Panda has been attributed to a cyber attack targeting an unspecified organization in Myanmar with previously...

    Artificial Intelligence – What’s all the fuss?

    Talking about AI: Definitions Artificial Intelligence (AI) — AI refers to the simulation of human intelligence in machines, enabling them to perform tasks that...

    State-Sponsored Hackers Weaponize ClickFix Tactic in Targeted Malware Campaigns

    Multiple state-sponsored hacking groups from Iran, North Korea, and Russia have been found leveraging the increasingly popular ClickFix social engineering tactic to deploy...

    Blockchain Offers Security Benefits – But Don’t Neglect Your Passwords

    Apr 17, 2025The Hacker NewsPassword Security / Blockchain Blockchain is best known for its use in cryptocurrencies like Bitcoin, but it also holds significant...

    Node.js Malware Campaign Targets Crypto Users with Fake Binance and TradingView Installers

    Apr 17, 2025Ravie LakshmananCybersecurity / Malware Microsoft is calling attention to an ongoing malvertising campaign that makes use of Node.js to deliver malicious payloads...

    Latest articles

    spot_imgspot_img