U.S. Govt. Funding for MITRE’s CVE Ends April 16, Cybersecurity Community on Alert
Apr 16, 2025Ravie LakshmananVulnerability Management / Incident Response The U.S. government funding…
Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool
Apr 15, 2025Ravie LakshmananLinux / Malware The China-linked threat actor known as…
Majority of Browser Extensions Can Access Sensitive Enterprise Data, New Report Finds
Apr 15, 2025The Hacker NewsData Privacy / Enterprise Security Everybody knows browser…
Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft
Apr 14, 2025Ravie LakshmananEmail Security / Cyber Attack Cybersecurity researchers are calling…
ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading
Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT…
Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT
Apr 14, 2025Ravie LakshmananCyber Attack / Malware A threat actor with ties…
A Deep Dive Into AI & NHI
Apr 10, 2025The Hacker NewsAI Security / Enterprise Security AI agents have…
CTM360 Uncovers a Play Masquerading Party
Overview of the PlayPraetor Masquerading Party Variants CTM360 has now identified a…
OttoKit WordPress Plugin Admin Creation Vulnerability Under Active Exploitation
Apr 11, 2025Ravie LakshmananWebsite Security / Vulnerability A newly disclosed high-severity security…


