Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
Jul 08, 2025Ravie LakshmananMalware / Cybercrime In yet another instance of threat…
Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms
Jul 08, 2025Ravie LakshmananCyber Espionage / Threat Intelligence Russian organizations have been…
SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools
Cybersecurity researchers have disclosed a malicious campaign that leverages search engine optimization…
TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors
A hacking group with ties other than Pakistan has been found targeting…
Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials
Jul 03, 2025Ravie LakshmananVulnerability / Network Security Cisco has released security updates…
Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
Jul 04, 2025Ravie LakshmananMobile Security / Privacy Google has been ordered by…
Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
Jul 04, 2025Ravie LakshmananVulnerability / Linux Cybersecurity researchers have disclosed two security…
Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS
Threat actors are weaponizing exposed Java Debug Wire Protocol (JDWP) interfaces to…
Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties
Jul 05, 2025Ravie LakshmananNational Security / Privacy Taiwan's National Security Bureau (NSB)…


