Threat Actors Weaponize HexStrike AI to Exploit Citrix Flaws Within a Week of Disclosure
Sep 03, 2025Ravie LakshmananArtificial Intelligence / Vulnerability Threat actors are attempting to…
CISA Adds TP-Link and WhatsApp Flaws to KEV Catalog Amid Active Exploitation
Sep 03, 2025Ravie LakshmananVulnerability / Mobile Security The U.S. Cybersecurity and Infrastructure…
Lazarus Group Expands Malware Arsenal With PondRAT, ThemeForestRAT, and RemotePE
Sep 02, 2025Ravie LakshmananMalware / Threat Intelligence The North Korea-linked threat actor…
A Critical Part of Enterprise AI Governance
Sep 02, 2025The Hacker NewsData Privacy / SaaS Security The Harsh Truths…
Android Droppers Now Deliver SMS Stealers and Spyware, Not Just Banking Trojans
Sep 01, 2025Ravie LakshmananMobile Security / Malvertising Cybersecurity researchers are calling attention…
ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics
Cybersecurity researchers have discovered a new phishing campaign undertaken by the North…
Can Your Security Stack See ChatGPT? Why Network Visibility Matters
Aug 29, 2025The Hacker NewsEnterprise Security / Artificial Intelligence Generative AI platforms…
Abandoned Sogou Zhuyin Update Server Hijacked, Weaponized in Taiwan Espionage Campaign
An abandoned update server associated with input method editor (IME) software Sogou…
Amazon Disrupts APT29 Watering Hole Campaign Abusing Microsoft Device Code Authentication
Aug 29, 2025Ravie LakshmananThreat Intelligence / Malware Amazon on Friday said it…


