Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT
The threat actor known as Dragon Breath has been observed making use…
AI Tools in Malware, Botnets, GDI Flaws, Election Attacks & More
Nov 06, 2025Ravie LakshmananCybersecurity / Hacking News Cybercrime has stopped being a…
Samsung Zero-Click Flaw Exploited to Deploy LANDFALL Android Spyware via WhatsApp
Nov 07, 2025Ravie LakshmananMobile Security / Vulnerability A now-patched security flaw in…
$176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More
Oct 23, 2025Ravie LakshmananCybersecurity / Hacking News Criminals don’t need to be…
3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation
Oct 24, 2025Ravie LakshmananMalware / Hacking News A malicious network of YouTube…
Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks
Oct 11, 2025Ravie LakshmananNetwork Security / Vulnerability Threat actors are abusing Velociraptor,…
Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
Cybersecurity researchers have discovered an Android banking malware campaign that has leveraged…
U.S. Seizes $7.74M in Crypto Tied to North Korea’s Global Fake IT Worker Network
The U.S. Department of Justice (DoJ) said it has filed a civil…
300 Servers and €3.5M Seized as Europol Strikes Ransomware Networks Worldwide
May 23, 2025Ravie LakshmananRansomware / Dark Web As part of the latest…


