North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack
Feb 12, 2025Ravie LakshmananIT Security / Cybercrime The North Korea-linked threat actor…
4 Ways to Keep MFA From Becoming too Much of a Good Thing
Feb 11, 2025The Hacker NewsIT Security / Threat Protection Multi-factor authentication (MFA)…
Google Confirms Android SafetyCore Enables AI-Powered On-Device Content Classification
Feb 11, 2025Ravie LakshmananMobile Security / Machine Learning Google has stepped in…
8Base Ransomware Data Leak Sites Seized in International Law Enforcement Operation
Feb 11, 2025Ravie LakshmananCybercrime / RansomwareSource: The Nation A coordinated law enforcement…
Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores
Feb 10, 2025Ravie LakshmananMalware / Payment Security Threat actors have been observed…
SparkCat Malware Uses OCR to Extract Crypto Wallet Recovery Phrases from Images
A new malware campaign dubbed SparkCat has leveraged a suit of bogus…
Hackers Exploiting SimpleHelp RMM Flaws for Persistent Access and Ransomware
Feb 07, 2025Ravie LakshmananVulnerability / Threat Intelligence Threat actors have been observed…
India’s RBI Introduces Exclusive “bank.in” Domain to Combat Digital Banking Fraud
Feb 07, 2025Ravie LakshmananFinancial Security / Regulatory Compliance India's central bank, the…
Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling Code Injection Attacks
Feb 07, 2025Ravie LakshmananCloud Security / Web Security Microsoft is warning of…


