Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft
Apr 14, 2025Ravie LakshmananEmail Security / Cyber Attack Cybersecurity researchers are calling…
ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading
Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT…
Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT
Apr 14, 2025Ravie LakshmananCyber Attack / Malware A threat actor with ties…
A Deep Dive Into AI & NHI
Apr 10, 2025The Hacker NewsAI Security / Enterprise Security AI agents have…
CTM360 Uncovers a Play Masquerading Party
Overview of the PlayPraetor Masquerading Party Variants CTM360 has now identified a…
OttoKit WordPress Plugin Admin Creation Vulnerability Under Active Exploitation
Apr 11, 2025Ravie LakshmananWebsite Security / Vulnerability A newly disclosed high-severity security…
SpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Apps
Cybersecurity researchers have found that threat actors are setting up deceptive websites…
Initial Access Brokers Shift Tactics, Selling More for Less
What are IABs? Initial Access Brokers (IABs) specialize in gaining unauthorized entry…
Paper Werewolf Deploys PowerModul Implant in Targeted Cyberattacks on Russian Sectors
The threat actor known as Paper Werewolf has been observed exclusively targeting…


