GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials
A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and…
FBI Warns North Korean Hackers Using Malicious QR Codes in Spear-Phishing
Jan 09, 2026Ravie LakshmananMobile Security / Email Security The U.S. Federal Bureau…
CISA Retires 10 Emergency Cybersecurity Directives Issued Between 2019 and 2024
Jan 09, 2026Ravie LakshmananGovernment / Vulnerability Management The U.S. Cybersecurity and Infrastructure…
MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
Jan 10, 2026Ravie LakshmananCyber Espionage / Malware The Iranian threat actor known…
Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators
Jan 07, 2026The Hacker NewsThreat Detection / Endpoint Security Security teams are…
Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control
Jan 07, 2026Ravie LakshmananVulnerability / Automation Cybersecurity researchers have disclosed details of…
27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials
Cybersecurity researchers have disclosed details of what has been described as a…
Critical CVSS 9.8 Flaw Found in IBM API Connect Authentication System
Dec 31, 2026Ravie LakshmananAPI Security / Vulnerability IBM has disclosed details of…
Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign
Cybersecurity researchers have disclosed details of a phishing campaign that involves the…


