Leaked Black Basta Ransomware Chat Logs Reveal Inner Workings and Internal Conflicts
More than a year's worth of internal chat logs from a ransomware…
Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks
Feb 21, 2025Ravie LakshmananNetwork Security / Vulnerability Cisco has confirmed that a…
Bybit Confirms Record-Breaking $1.46 Billion Crypto Heist in Sophisticated Cold Wallet Attack
Feb 22, 2025Ravie LakshmananFinancial Crime / Cryptocurrency Cryptocurrency exchange Bybit on Friday…
Hackers Exploit Signal’s Linked Devices Feature to Hijack Accounts via Malicious QR Codes
Feb 19, 2025Ravie LakshmananMobile Security / Cyber Espionage Multiple Russia-aligned threat actors…
New Snake Keylogger Variant Leverages AutoIt Scripting to Evade Detection
Feb 19, 2025The Hacker NewsMalware / Threat Intelligence A new variant of…
Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts
Microsoft is calling attention to an emerging threat cluster it calls Storm-2372…
Microsoft Uncovers Sandworm Subgroup’s Global Cyber Attacks Spanning 15+ Countries
A subgroup within the infamous Russian state-sponsored hacking group known as Sandworm…
North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack
Feb 12, 2025Ravie LakshmananIT Security / Cybercrime The North Korea-linked threat actor…
Over 57 Nation-State Threat Groups Using AI for Cyber Operations
Over 57 distinct threat actors with ties to China, Iran, North Korea,…