ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices
May 23, 2025Ravie LakshmananThreat Intelligence / Network Security Cybersecurity researchers have disclosed…
Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique
The malware known as Latrodectus has become the latest to embrace the…
300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide
May 23, 2025Ravie LakshmananRansomware / Dark Web As part of the latest…
Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise
May 22, 2025Ravie LakshmananCybersecurity / Vulnerability A privilege escalation flaw has been…
Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks
May 22, 2025Ravie LakshmananVulnerability / Threat Intelligence A Chinese-speaking threat actor tracked…
FBI and Europol Disrupt Lumma Stealer Malware Network Linked to 10 Million Infections
A sprawling operation undertaken by global law enforcement agencies and a consortium…
Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics
Russian cyber threat actors have been attributed to a state-sponsored campaign targeting…
PureRAT Malware Spikes 4x in 2025, Deploying PureLogs to Target Russian Firms
May 21, 2025Ravie LakshmananMalware / Windows Security Russian organizations have become the…
A Security-First Approach to Closing Vulnerability Windows
Patching vulnerabilities is one of the most basic principles of cybersecurity —…


