Apr 15, 2025Ravie LakshmananVulnerability / Endpoint Security
A recently disclosed security flaw in Gladinet CentreStack also impacts its Triofox remote access and collaboration solution,...
Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT that has been observed in attacks targeting healthcare and pharmaceutical sectors.
"The...
Apr 14, 2025Ravie LakshmananEmail Security / Cyber Attack
Cybersecurity researchers are calling attention to a new type of credential phishing scheme that ensures that...
Apr 14, 2025Ravie LakshmananThreat Intelligence / Cybersecurity
Attackers aren't waiting for patches anymore — they are breaking in before defenses are ready. Trusted security...
Apr 14, 2025The Hacker NewsCybersecurity / Security Training
AI is changing cybersecurity faster than many defenders realize. Attackers are already using AI to automate...
Apr 14, 2025Ravie LakshmananCyber Attack / Malware
A threat actor with ties to Pakistan has been observed targeting various sectors in India with various...
Apr 11, 2025Ravie LakshmananNetwork Security / Vulnerability
Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate...
The threat actor known as Paper Werewolf has been observed exclusively targeting Russian entities with a new implant called PowerModul.
The activity, which took...
What are IABs?
Initial Access Brokers (IABs) specialize in gaining unauthorized entry into computer systems and networks, then selling that access to other cybercriminals....