Hackers Exploit WordPress mu-Plugins to Inject Spam and Hijack Site Images
Mar 31, 2025Ravie LakshmananData Theft / Website Security Threat actors are using…
Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp
The threat actors behind the zero-day exploitation of a recently-patched security vulnerability…
Russia-Linked Gamaredon Uses Troop-Related Lures to Deploy Remcos RAT in Ukraine
Mar 31, 2025Ravie LakshmananThreat Intelligence / Malware Entities in Ukraine have been…
Nine-Year-Old npm Packages Hijacked to Exfiltrate API Keys via Obfuscated Scripts
Mar 28, 2025Ravie LakshmananCryptocurrency / Developer Security Cybersecurity researchers have discovered several…
PJobRAT Malware Campaign Targeted Taiwanese Users via Fake Chat Apps
Mar 28, 2025Ravie LakshmananSpyware / Malware An Android malware family previously observed…
RESURGE Malware Exploits Ivanti Flaw with Rootkit and Web Shell Features
Mar 30, 2025Ravie LakshmananVulnerability / Zero-Day The U.S. Cybersecurity and Infrastructure Security…
CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection
Mar 28, 2025Ravie LakshmananEndpoint Security / Threat Intelligence Cybersecurity researchers are calling…
New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials
Mar 29, 2025Ravie LakshmananThreat Intelligence / Mobile Security Cybersecurity researchers have discovered…
BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability
Mar 29, 2025Ravie LakshmananCybercrime / Vulnerability In what's an instance of hacking…


