No menu items!
No menu items!
More

    THN

    Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability

    Apr 15, 2025Ravie LakshmananVulnerability / Endpoint Security A recently disclosed security flaw in Gladinet CentreStack also impacts its Triofox remote access and collaboration solution,...

    ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading

    Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT that has been observed in attacks targeting healthcare and pharmaceutical sectors. "The...

    Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft

    Apr 14, 2025Ravie LakshmananEmail Security / Cyber Attack Cybersecurity researchers are calling attention to a new type of credential phishing scheme that ensures that...

    Windows 0-Day, VPN Exploits, Weaponized AI, Hijacked Antivirus and More

    Apr 14, 2025Ravie LakshmananThreat Intelligence / Cybersecurity Attackers aren't waiting for patches anymore — they are breaking in before defenses are ready. Trusted security...

    Evolve Faster Than the Threats or Get Left Behind

    Apr 14, 2025The Hacker NewsCybersecurity / Security Training AI is changing cybersecurity faster than many defenders realize. Attackers are already using AI to automate...

    Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT

    Apr 14, 2025Ravie LakshmananCyber Attack / Malware A threat actor with ties to Pakistan has been observed targeting various sectors in India with various...

    Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

    Apr 11, 2025Ravie LakshmananNetwork Security / Vulnerability Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate...

    Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors

    The threat actor known as Paper Werewolf has been observed exclusively targeting Russian entities with a new implant called PowerModul. The activity, which took...

    Initial Access Brokers Shift Tactics, Selling More for Less

    What are IABs? Initial Access Brokers (IABs) specialize in gaining unauthorized entry into computer systems and networks, then selling that access to other cybercriminals....

    Latest articles

    spot_imgspot_img