AI-driven SOC 3.0 automates 100% of alerts, cuts response time from days to minutes, and enables proactive threat ...
Auto-Color Linux malware targets governments and universities, using stealth tactics and encryption to evade detection and ...
Hackers crack passwords using brute force, dictionary, and rainbow table attacks. Protect data with MFA, strong hashing, and ...
CERT-UA warns of UAC-0173 phishing deploying DCRat via Cloudflare R2, using RDP exploits, FIDDLER, and SENDMAIL to target ...
Malicious Python package "automslc" (104K+ downloads) enables Deezer piracy, bypassing API restrictions and linking to a C2 ...
CISA adds Microsoft Partner Center and Zimbra ZCS flaws to its KEV catalog, citing active exploitation. Federal agencies must ...
LightSpy malware now supports 100+ commands across platforms, targeting Facebook and Instagram data while expanding ...
Ghostwriter deploys malware-laced Excel files, steganography, and obfuscated macros to target Ukraine and Belarus.
A large-scale malware campaign exploited a vulnerable Windows driver to bypass security and deploy HiddenGh0st RAT.
In early 2025, cybersecurity experts uncovered a sophisticated campaign involving Lumma Stealer, an information-stealing ...
Also downloaded via the bogus GitHub projects are remote administration tools like AsyncRAT and Quasar RAT that can be used ...
FatalRAT malware is targeting APAC industries via phishing, using Chinese cloud services for stealthy multi-stage infection ...