Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017
Mar 18, 2025Ravie LakshmananVulnerability / Windows Security An unpatched security flaw impacting…
New ‘Rules File Backdoor’ Attack Lets Hackers Inject Malicious Code via AI Code Editors
Mar 18, 2025Ravie LakshmananAI Security / Software Security Cybersecurity researchers have disclosed…
A Stealthy RAT Targeting Credentials and Crypto Wallets
Microsoft is calling attention to a novel remote access trojan (RAT) named…
Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure
Mar 17, 2025Ravie LakshmananVulnerability / Web Security A recently disclosed security flaw…
Unpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last Year
Mar 17, 2025Ravie LakshmananBotnet / Vulnerability An unpatched security flaw impacting the…
OBSCURE#BAT Malware Uses Fake CAPTCHA Pages to Deploy Rootkit r77 and Evade Detection
Mar 14, 2025Ravie LakshmananThreat Intelligence / Malware A new malware campaign has…
New MassJacker Malware Targets Piracy Users, Hijacking Cryptocurrency Transactions
Mar 14, 2025Ravie LakshmananSoftware Security / Cybercrime Users searching for pirated software…
Why Most Microsegmentation Projects Fail—And How Andelyn Biosciences Got It Right
Most microsegmentation projects fail before they even get off the ground—too complex,…
See How Hackers Breach Networks and Demand a Ransom
Mar 14, 2025The Hacker NewsData Protection / Ransomware Cyber threats evolve daily.…