Adds Device Fingerprinting, PNG Steganography Payloads
The threat actor behind Rhadamanthys has also advertised two other tools called…
7 Key Workflows for Maximum Impact
Penetration testing is critical to uncovering real-world security weaknesses. With the shift…
Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware
Oct 02, 2025Ravie LakshmananMalware / Cyber Espionage The threat actor known as…
Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown
Oct 02, 2025Ravie LakshmananPython / Malware Cybersecurity researchers have flagged a malicious…
OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps
Oct 01, 2025Ravie LakshmananVulnerability / API Security A high-severity security flaw has…
New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer
Oct 01, 2025Ravie LakshmananEncryption / Hardware Security In yet another piece of…
Hackers Exploit Milesight Routers to Send Phishing SMS to European Users
Oct 01, 2025Ravie LakshmananVulnerability / Malware Unknown threat actors are abusing Milesight…
$50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections
A group of academics from KU Leuven and the University of Birmingham…
New China-Linked Hacker Group Hits Governments With Stealth Malware
Sep 30, 2025Ravie LakshmananCyber Espionage / Malware Government and telecommunications organizations across…


