Leaked Black Basta Ransomware Chat Logs Reveal Inner Workings and Internal Conflicts
More than a year's worth of internal chat logs from a ransomware…
LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile
Cybersecurity researchers have flagged an updated version of the LightSpy implant that…
Bybit Confirms Record-Breaking $1.46 Billion Crypto Heist in Sophisticated Cold Wallet Attack
Feb 22, 2025Ravie LakshmananFinancial Crime / Cryptocurrency Cryptocurrency exchange Bybit on Friday…
North Korean Hackers Target Freelance Developers in Job Scam to Deploy Malware
Freelance software developers are the target of an ongoing campaign that leverages…
New Snake Keylogger Variant Leverages AutoIt Scripting to Evade Detection
Feb 19, 2025The Hacker NewsMalware / Threat Intelligence A new variant of…
RA World Ransomware Attack in South Asia Links to Chinese Espionage Toolset
An RA World ransomware attack in November 2024 targeting an unnamed Asian…
8Base Ransomware Data Leak Sites Seized in International Law Enforcement Operation
Feb 11, 2025Ravie LakshmananCybercrime / RansomwareSource: The Nation A coordinated law enforcement…
AI-Powered Social Engineering: Reinvented Threats
The foundations for social engineering attacks – manipulating humans – might not…
768 CVEs Exploited in 2024, Reflecting a 20% Increase from 639 in 2023
Feb 03, 2025Ravie LakshmananVulnerability / Network Security As many as 768 vulnerabilities…