See How Hackers Breach Networks and Demand a Ransom
Mar 14, 2025The Hacker NewsData Protection / Ransomware Cyber threats evolve daily.…
Fake CAPTCHA PDFs Spread Lumma Stealer via Webflow, GoDaddy, and Other Domains
Cybersecurity researchers have uncovered a widespread phishing campaign that uses fake CAPTCHA…
CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation
Feb 26, 2025Ravie LakshmananEnterprise Security / Vulnerability The U.S. Cybersecurity and Infrastructure…
New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer
Feb 24, 2025Ravie LakshmananEndpoint Security / Vulnerability Cybersecurity researchers are warning of…
New Snake Keylogger Variant Leverages AutoIt Scripting to Evade Detection
Feb 19, 2025The Hacker NewsMalware / Threat Intelligence A new variant of…
Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts
Microsoft is calling attention to an emerging threat cluster it calls Storm-2372…
Hackers Exploiting SimpleHelp RMM Flaws for Persistent Access and Ransomware
Feb 07, 2025Ravie LakshmananVulnerability / Threat Intelligence Threat actors have been observed…
Fake Google Chrome Sites Distribute ValleyRAT Malware via DLL Hijacking
Feb 06, 2025Ravie LakshmananCyber Attack / Malware Bogus websites advertising Google Chrome…