Citrix Bleed 2 Flaw Enables Token Theft; SAP GUI Flaws Risk Sensitive Data Exposure
Jun 25, 2025Ravie LakshmananData Privacy / Vulnerability Cybersecurity researchers have detailed two…
Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials
Jun 05, 2025Ravie LakshmananBrowser Security / Online Safety Cybersecurity researchers have flagged…
Golden Chickens Deploy TerraStealerV2 to Steal Browser Credentials and Crypto Wallet Data
The threat actors known as Golden Chickens have been attributed to two…
Hackers Use .NET MAUI to Target Indian and Chinese Users with Fake Banking, Social Apps
Mar 25, 2025Ravie LakshmananMobile Security / Data Theft Cybersecurity researchers are calling…
See How Hackers Breach Networks and Demand a Ransom
Mar 14, 2025The Hacker NewsData Protection / Ransomware Cyber threats evolve daily.…
GSMA Confirms End-to-End Encryption for RCS, Enabling Secure Cross-Platform Messaging
Mar 14, 2025Ravie LakshmananMobile Security / Encryption The GSM Association (GSMA) has…
FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations
Mar 07, 2025Ravie Lakshmanan Threat hunters have shed light on a "sophisticated…
Vo1d Botnet’s Peak Surpasses 1.59M Infected Android TVs, Spanning 226 Countries
Mar 03, 2025Ravie LakshmananMobile Security / Botnet Brazil, South Africa, Indonesia, Argentina,…
Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware
Feb 27, 2025Ravie LakshmananMalware / Network Security The threat actor known as…