Malware Attack Targets World Uyghur Congress Leaders via Trojanized UyghurEdit++ Tool
Apr 29, 2025Ravie LakshmananCybersecurity / Malware In a new campaign detected in…
Hackers Exploit Critical Craft CMS Flaws; Hundreds of Servers Likely Compromised
Apr 28, 2025Ravie LakshmananWeb Application Security / Vulnerability Threat actors have been…
DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks
Apr 25, 2025Ravie LakshmananVulnerability / Network Security Cybersecurity researchers are warning about…
Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers
Apr 27, 2025Ravie LakshmananKubernetes / Cloud Security Microsoft has revealed that a…
Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers
Apr 25, 2025Ravie LakshmananVulnerability / Data Breach Cybersecurity researchers have disclosed three…
ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion
Apr 26, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have detailed the activities…
Why NHIs Are Security’s Most Dangerous Blind Spot
When we talk about identity in cybersecurity, most people think of usernames,…
New Critical SAP NetWeaver Flaw Exploited to Drop Web Shell, Brute Ratel Framework
Apr 25, 2025Ravie LakshmananVulnerability / Enterprise Security Threat actors are likely exploiting…


