LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile
Cybersecurity researchers have flagged an updated version of the LightSpy implant that…
Two Actively Exploited Security Flaws in Adobe and Oracle Products Flagged by CISA
Feb 25, 2025Ravie LakshmananNetwork Security / Vulnerability The U.S. Cybersecurity and Infrastructure…
New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer
Feb 24, 2025Ravie LakshmananEndpoint Security / Vulnerability Cybersecurity researchers are warning of…
Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks
Feb 21, 2025Ravie LakshmananNetwork Security / Vulnerability Cisco has confirmed that a…
Over 12,000 KerioControl firewalls exposed to exploited RCE flaw
Over twelve thousand GFI KerioControl firewall instances are exposed to a critical…
Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025
Feb 21, 2025The Hacker NewsIdentity Security / Threat Prevention In today's rapidly…
Cybercriminals Can Now Clone Any Brand’s Site in Minutes Using Darcula PhaaS v3
Feb 21, 2025Ravie LakshmananDark Web / Cybercrime The threat actors behind the…
Data Leak Exposes TopSec’s Role in China’s Censorship-as-a-Service Operations
Feb 21, 2025Ravie LakshmananSurveillance / Content Monitoring An analysis of a data…


