No menu items!
No menu items!
More

    THN

    Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp

    The threat actors behind the zero-day exploitation of a recently-patched security vulnerability in Microsoft Windows have been found to deliver two new backdoors...

    5 Impactful AWS Vulnerabilities You’re Responsible For

    Mar 31, 2025The Hacker NewsIntrusion Detection / Vulnerability If you're using AWS, it's easy to assume your cloud security is handled - but that's...

    Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images

    Mar 31, 2025Ravie LakshmananData Theft / Website Security Threat actors are using the "mu-plugins" directory in WordPress sites to conceal malicious code with the...

    Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More

    Mar 31, 2025Ravie LakshmananThreat Intelligence / Cybersecurity Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or...

    Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine

    Mar 31, 2025Ravie LakshmananThreat Intelligence / Malware Entities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote...

    RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features

    Mar 30, 2025Ravie LakshmananVulnerability / Zero-Day The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that...

    New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials

    Mar 29, 2025Ravie LakshmananThreat Intelligence / Mobile Security Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that's primarily designed to target...

    BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability

    Mar 29, 2025Ravie LakshmananCybercrime / Vulnerability In what's an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure associated...

    Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMA

    Mar 28, 2025Ravie LakshmananOperational Technology / Vulnerability Cybersecurity researchers have disclosed 46 new security flaws in products from three solar inverter vendors, Sungrow, Growatt,...

    Latest articles

    spot_imgspot_img