Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
May 20, 2025Ravie LakshmananMalware / Cloud Security A threat actor known as…
Key Insights from the 2025 State of Pentesting Report
May 20, 2025The Hacker NewsPenetration Testing / Risk Management In the newly…
Ransomware Gangs Use Skitnet Malware for Stealthy Data Theft and Remote Access
May 19, 2025Ravie LakshmananRansomware / Malware Several ransomware actors are using a…
RVTools Official Site Hacked to Deliver Bumblebee Malware via Trojanized Installer
May 19, 2025Ravie LakshmananMalware / Supply Chain Attack The official site for…
Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers
A Russia-linked threat actor has been attributed to a cyber espionage operation…
5 BCDR Essentials for Effective Ransomware Defense
Ransomware has evolved into a deceptive, highly coordinated and dangerously sophisticated threat…
New Chrome Vulnerability Enables Cross-Origin Data Leak via Loader Referrer Policy
May 15, 2025Ravie LakshmananBrowser Security / Web Security Google on Wednesday released…
Pen Testing for Compliance Only? It’s Time to Change Your Approach
May 15, 2025The Hacker NewsCompliance / Penetration Testing Imagine this: Your organization…
Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
Cybersecurity researchers have shed light on a new malware campaign that makes…


