News

A Chinese-speaking threat actor tracked as UAT-6382 has been linked to the exploitation of a now-patched ...
52% of breaches stem from manual identity workflows in disconnected apps—causing customer loss and compliance risks.
Microsoft and Europol dismantled Lumma’s 2,300-domain C2 network after 10M infections tied to credential and crypto theft.
UNC5221 exploited Ivanti EPMM flaws CVE-2025-4427/4428 in global attacks starting May 15, 2025, enabling remote access and ...
APT28 targets NATO-aligned logistics and tech firms via malware, phishing, and 7 CVEs to spy on Ukraine aid routes.
Three critical Versa Concerto flaws disclosed after 90 days allow remote code execution via reverse proxy misconfigurations.
Fake Facebook ads impersonating Kling AI deploy PureHVNC RAT via spoofed sites, stealing credentials and crypto data.
The original executable that launches "ckcfb.exe" simultaneously also extracts a second binary referred to as "StilKrip.exe," ...
The attack chains leverage spear-phishing lures as a starting point to activate the infection process and deploy a known ...
A new cryptojacking campaign dubbed RedisRaider is hijacking publicly exposed Redis servers by injecting cron jobs using ...
Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker that targeted an unnamed ...
Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web ...