State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments
Jul 15, 2025Ravie LakshmananCyber Espionage / Threat Intelligence Governmental organizations in Southeast…
New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries
Jul 14, 2025Ravie LakshmananMalware / Web Security Threat actors behind the Interlock…
The Unusual Suspect: Git Repos
Jul 14, 2025The Hacker NewsSecrets Management / SaaS Security While phishing and…
CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center
Jul 14, 2025Ravie LakshmananCybercrime / Law Enforcement India's Central Bureau of Investigation…
Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
An Iranian-backed ransomware-as-a-service (RaaS) named Pay2Key has resurfaced in the wake of…
Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
Jul 11, 2025Ravie LakshmananCyber Attack / Vulnerability A recently disclosed maximum-severity security…
Over 600 Laravel Apps Exposed to Remote Code Execution Due to Leaked APP_KEYs on GitHub
Cybersecurity researchers have discovered a serious security issue that allows leaked Laravel…
New RowHammer Attack Variant Degrades AI Models on NVIDIA GPUs
Jul 12, 2025Ravie LakshmananAI Security / Vulnerability NVIDIA is urging customers to…
Securing Data in the AI Era
Jul 11, 2025The Hacker NewsData Security / Enterprise Security The 2025 Data…


