Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores
Feb 10, 2025Ravie LakshmananMalware / Payment Security Threat actors have been observed…
SparkCat Malware Uses OCR to Extract Crypto Wallet Recovery Phrases from Images
A new malware campaign dubbed SparkCat has leveraged a suit of bogus…
Hackers Exploiting SimpleHelp RMM Flaws for Persistent Access and Ransomware
Feb 07, 2025Ravie LakshmananVulnerability / Threat Intelligence Threat actors have been observed…
India’s RBI Introduces Exclusive “bank.in” Domain to Combat Digital Banking Fraud
Feb 07, 2025Ravie LakshmananFinancial Security / Regulatory Compliance India's central bank, the…
Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling Code Injection Attacks
Feb 07, 2025Ravie LakshmananCloud Security / Web Security Microsoft is warning of…
AI-Powered Social Engineering: Reinvented Threats
The foundations for social engineering attacks – manipulating humans – might not…
Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection
Feb 08, 2025Ravie LakshmananArtificial Intelligence / Supply Chain Security Cybersecurity researchers have…
DeepSeek App Transmits Sensitive User and Device Data Without Encryption
Feb 07, 2025Ravie LakshmananMobile Security / Artificial Intelligence A new audit of…
CISA Warns of Active Exploits Targeting Trimble Cityworks Vulnerability
Feb 07, 2025The Hacker NewsVulnerability / Malware The U.S. Cybersecurity and Infrastructure…