CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection
Mar 28, 2025Ravie LakshmananEndpoint Security / Threat Intelligence Cybersecurity researchers are calling…
New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials
Mar 29, 2025Ravie LakshmananThreat Intelligence / Mobile Security Cybersecurity researchers have discovered…
BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability
Mar 29, 2025Ravie LakshmananCybercrime / Vulnerability In what's an instance of hacking…
Researchers Uncover 46 Critical Flaws in Solar Inverters From Sungrow, Growatt, and SMA
Mar 28, 2025Ravie LakshmananOperational Technology / Vulnerability Cybersecurity researchers have disclosed 46…
Hackers Repurpose RansomHub’s EDRKillShifter in Medusa, BianLian, and Play Attacks
Mar 27, 2025Ravie LakshmananEndpoint Security / Ransomware A new analysis has uncovered…
New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims’ DNS Email Records
Mar 27, 2025Ravie LakshmananEmail Security / Malware Cybersecurity researchers have shed light…
CISA Warns of Sitecore RCE Flaws; Active Exploits Hit Next.js and DrayTek Devices
Mar 27, 2025Ravie LakshmananVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure…
New SparrowDoor Backdoor Variants Found in Attacks on U.S. and Mexican Organizations
Mar 26, 2025Ravie LakshmananMalware / Vulnerability The Chinese threat actor known as…
EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware
Mar 26, 2025Ravie LakshmananWindows Security / Vulnerability The threat actor known as…


