News
Malicious Go and PyPI packages use Gmail and wget to exfiltrate data, wipe Linux disks, and hijack crypto credentials.
Leonidas Varagiannis (aka War), 21, and Prasan Nepal (aka Trippy), 20, the two alleged leaders of a child extortion group 764 ...
Iranian threat actor Lemon Sandstorm accessed Middle East CNI from 2023–2025 using VPN flaws, web shells, and 8 custom tools.
Backdoor plugin hijacks WordPress sites with admin access, stealth reinfection, and JS ad fraud—active since Jan 2025.
Stealth malware MintsLoader delivers GhostWeaver RAT + Evades sandboxes using DGA + Powers data theft via encrypted C2 ...
Claude AI orchestrated 100 fake personas in global influence campaigns + enabled malware, scams, and brute-force attacks.
"TikTok infringed the GDPR regarding its transfers of EEA [European Economic Area] User Data to China and its transparency ...
According to OX Security's 2025 Application Security Benchmark Report, a staggering 95–98% of AppSec alerts do not require ...
Phishing attacks deliver DarkWatchman and Sheriff malware; targets span Russia, Ukraine, Baltics, with stealth and ...
RansomHub's sudden offline status triggered affiliate migration to Qilin and cartel shifts, signaling major RaaS disruption.
NDR solutions uncover hidden threats missed by legacy tools by analyzing encrypted traffic, lateral movement, and blind spots ...
In an advisory issued on March 7, 2025, Commvault said it was notified by Microsoft on February 20 about unauthorized ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results