ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion
Apr 26, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have detailed the activities…
Lotus Panda Hacks SE Asian Governments With Browser Stealers and Sideloaded Malware
Apr 22, 2025Ravie LakshmananCyber Espionage / Threat Intelligence The China-linked cyber espionage…
Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft
Apr 14, 2025Ravie LakshmananEmail Security / Cyber Attack Cybersecurity researchers are calling…
Lovable AI Found Most Vulnerable to VibeScamming — Enabling Anyone to Build Live Scam Pages
Lovable, a generative artificial intelligence (AI) powered platform that allows for creating…
Microsoft Warns of Tax-Themed Email Attacks Using PDFs and QR Codes to Deliver Malware
Microsoft is warning of several phishing campaigns that are leveraging tax-related themes…
YouTube Game Cheats Spread Arcane Stealer Malware to Russian-Speaking Users
Mar 20, 2025Ravie LakshmananMalware / Threat Analysis YouTube videos promoting game cheats…
A Stealthy RAT Targeting Credentials and Crypto Wallets
Microsoft is calling attention to a novel remote access trojan (RAT) named…
Debunking the AI Hype: Inside Real Hacker Tactics
Feb 18, 2025The Hacker NewsArtificial Intelligence / Cyber Defense Is AI really…
Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts
Feb 05, 2025Ravie LakshmananCybersecurity / Cloud Security Cybercriminals are increasingly leveraging legitimate…


