Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
The threat actor known as Silver Fox has been spotted orchestrating a…
China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
Oct 31, 2025Ravie LakshmananEndpoint Security / Cyber Espionage The exploitation of a…
A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
Oct 31, 2025The Hacker NewsEndpoint Security / Network Security A design firm…
CISA warns of Lanscope Endpoint Manager flaw exploited in attacks
The Cybersecurity & Infrastructure Security Agency (CISA) is warning that hackers are…
Attackers Abuse Velociraptor Forensic Tool to Deploy Visual Studio Code for C2 Tunneling
Cybersecurity researchers have called attention to a cyber attack in which unknown…
Simple Steps for Attack Surface Reduction
Aug 14, 2025The Hacker NewsEndpoint Security / Application Security Story teaser text:…
Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation
Aug 10, 2025Ravie LakshmananVulnerability / Endpoint Security Cybersecurity researchers have presented new…
Researchers Reveal ReVault Attack Targeting Dell ControlVault3 Firmware in 100+ Laptop Models
Aug 09, 2025Ravie LakshmananVulnerability / Hardware Security Cybersecurity researchers have uncovered multiple…
What Attackers Are Doing With Them
When an organization's credentials are leaked, the immediate consequences are rarely visible—but…


