Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers
Apr 27, 2025Ravie LakshmananKubernetes / Cloud Security Microsoft has revealed that a…
Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers
Apr 25, 2025Ravie LakshmananVulnerability / Data Breach Cybersecurity researchers have disclosed three…
ToyMaker Uses LAGTOY to Sell Access to CACTUS Ransomware Gangs for Double Extortion
Apr 26, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have detailed the activities…
Why NHIs Are Security’s Most Dangerous Blind Spot
When we talk about identity in cybersecurity, most people think of usernames,…
New Critical SAP NetWeaver Flaw Exploited to Drop Web Shell, Brute Ratel Framework
Apr 25, 2025Ravie LakshmananVulnerability / Enterprise Security Threat actors are likely exploiting…
North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures
North Korea-linked threat actors behind the Contagious Interview have set up front…
Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Flaws and ThreatNeedle Malware
Apr 24, 2025Ravie LakshmananMalware / Threat Intelligence At least six organizations in…
Darcula Adds GenAI to Phishing Toolkit, Lowering the Barrier for Cybercriminals
Apr 24, 2025Ravie LakshmananPhishing / Cybercrime The threat actors behind the Darcula…
DPRK Hackers Steal $137M from TRON Users in Single-Day Phishing Attack
Apr 23, 2025Ravie LakshmananMalware / Cryptocurrency Multiple threat activity clusters with ties…


