New Malware Campaign Uses Cracked Software to Spread Lumma and ACR Stealer
Feb 24, 2025Ravie LakshmananEndpoint Security / Vulnerability Cybersecurity researchers are warning of…
New Snake Keylogger Variant Leverages AutoIt Scripting to Evade Detection
Feb 19, 2025The Hacker NewsMalware / Threat Intelligence A new variant of…
Russian-Linked Hackers Using ‘Device Code Phishing’ to Hijack Accounts
Microsoft is calling attention to an emerging threat cluster it calls Storm-2372…
Hackers Exploiting SimpleHelp RMM Flaws for Persistent Access and Ransomware
Feb 07, 2025Ravie LakshmananVulnerability / Threat Intelligence Threat actors have been observed…
Fake Google Chrome Sites Distribute ValleyRAT Malware via DLL Hijacking
Feb 06, 2025Ravie LakshmananCyber Attack / Malware Bogus websites advertising Google Chrome…
A Practical Guide for MSPs
Cybersecurity reporting is a critical yet often overlooked opportunity for service providers…
ChatGPT, Claude Impersonators Deliver JarkaStealer via Python Libraries
Nov 22, 2024Ravie LakshmananArtificial Intelligence / Malware Cybersecurity researchers have discovered two…
New Stealthy BabbleLoader Malware Spotted Delivering WhiteSnake and Meduza Stealers
Nov 18, 2024Ravie LakshmananThreat Intelligence / Ransomware Cybersecurity researchers have shed light…
New GootLoader Campaign Targets Users Searching for Bengal Cat Laws in Australia
Nov 11, 2024Ravie LakshmananMalware / SEO Poisoning In an unusually specific campaign,…