EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware
Jul 20, 2025Ravie LakshmananAI Security / Infostealers The financially motivated threat actor…
Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations
Jul 20, 2025Ravie LakshmananZero-Day / Vulnerability A critical security vulnerability in Microsoft…
Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services
Jul 18, 2025Ravie LakshmananCloud Security / AI Security Cybersecurity researchers have disclosed…
Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks
Jul 18, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have disclosed details of…
UNG0002 Group Hits China, Hong Kong, Pakistan Using LNK Files and RATs in Twin Campaigns
Jul 18, 2025Ravie LakshmananCyber Espionage / Malware Multiple sectors in China, Hong…
China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones
Jul 18, 2025Ravie LakshmananSurveillance / Mobile Security Cybersecurity researchers have shed light…
CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign
Jul 18, 2025Ravie LakshmananCyber Attack / Malware The Computer Emergency Response Team…
Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner
Jul 17, 2025Ravie LakshmananCryptocurrency / Vulnerability Cybersecurity researchers have discovered a new…
Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
Jul 17, 2025Ravie LakshmananMalware / Social Engineering Threat actors are leveraging public…