Google to Verify All Android Developers in 4 Countries to Block Malicious Apps
Aug 26, 2025Ravie LakshmananMobile Security / Data Privacy Google has announced plans…
UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats
Aug 25, 2025Ravie LakshmananMalware / Cyber Espionage A China-nexus threat actor known…
Insights from 160 Million Attack Simulations
Security Information and Event Management (SIEM) systems act as the primary tools…
Key Findings from the Blue Report 2025
As security professionals, it's easy to get caught up in a race…
Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot
Aug 24, 2025Ravie LakshmananMalware / Supply Chain Security Cybersecurity researchers have discovered…
Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware
Aug 22, 2025Ravie LakshmananCybercrime / Malware A 55-year-old Chinese national has been…
INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown
Aug 22, 2025Ravie LakshmananOnline Fraud / Financial Crime INTERPOL on Friday announced…
GeoServer Exploits, PolarEdge, and Gayfemboy Push Cybercrime Beyond Traditional Botnets
Cybersecurity researchers are calling attention to multiple campaigns that leverage known security…
Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage
Cybersecurity researchers are calling attention to malicious activity orchestrated by a China-nexus…


