North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets
Oct 23, 2025Ravie LakshmananCyber Espionage / Threat Intelligence Threat actors with ties…
BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
Oct 07, 2025Ravie LakshmananMalware / Threat Intelligence A Vietnamese threat actor named…
CountLoader Broadens Russian Ransomware Operations With Multi-Version Malware Loader
Cybersecurity researchers have discovered a new malware loader codenamed CountLoader that has…
Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions
Sep 04, 2025Ravie LakshmananArtificial Intelligence / Malware Cybersecurity researchers have flagged a…
Detecting Data Leaks Before Disaster
In January 2025, cybersecurity experts at Wiz Research found that Chinese AI…
Overcoming Risks from Chinese GenAI Tool Usage
Jul 25, 2025The Hacker NewsArtificial Intelligence / Data Privacy A recent analysis…
Kimsuky Exploits BlueKeep RDP Vulnerability to Breach Systems in South Korea and Japan
Apr 21, 2025Ravie LakshmananMalware / Vulnerability Cybersecurity researchers have flagged a new…
Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways
Apr 11, 2025Ravie LakshmananVulnerability / Network Security Palo Alto Networks has revealed…
CISA Adds CrushFTP Vulnerability to KEV Catalog Following Confirmed Active Exploitation
Apr 08, 2025Ravie LakshmananCyber Attack / Vulnerability A recently disclosed critical security…


