Patchwork Targets Turkish Defense Firms with Spear-Phishing Using Malicious LNK Files
Jul 25, 2025Ravie LakshmananMalware / Threat Intelligence The threat actor known as…
U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm
Jul 25, 2025Ravie LakshmananCybercrime / Insider Threat The U.S. Department of the…
Fire Ant Exploits VMware Flaws to Compromise ESXi Hosts and vCenter Environments
Virtualization and networking infrastructure have been targeted by a threat actor codenamed…
Critical Mitel Flaw Lets Hackers Bypass Login, Gain Full Access to MiVoice MX-ONE Systems
Jul 24, 2025Ravie LakshmananVulnerability / Network Security Mitel has released security updates…
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them
Jul 24, 2025The Hacker News Is Managing Customer Logins and Data Giving…
New Coyote Malware Variant Exploits Windows UI Automation to Steal Banking Credentials
Jul 23, 2025Ravie LakshmananWindows Security / Cryptocurrency The Windows banking trojan known…
Threat Actor Mimo Targets Magento and Docker to Deploy Crypto Miners and Proxyware
Jul 23, 2025Ravie LakshmananMalware / Cryptocurrency The threat actor behind the exploitation…
Google Launches OSS Rebuild to Expose Malicious Code in Widely Used Open-Source Packages
Jul 23, 2025Ravie LakshmananSoftware Integrity / DevSecOps Google has announced the launch…
Cisco Confirms Active Exploits Targeting ISE Flaws Enabling Unauthenticated Root Access
Jul 22, 2025Ravie LakshmananNetwork Security / Vulnerability Cisco on Monday updated its…


