Hackers Repurpose RansomHub’s EDRKillShifter in Medusa, BianLian, and Play Attacks
Mar 27, 2025Ravie LakshmananEndpoint Security / Ransomware A new analysis has uncovered…
New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims’ DNS Email Records
Mar 27, 2025Ravie LakshmananEmail Security / Malware Cybersecurity researchers have shed light…
New SparrowDoor Backdoor Variants Found in Attacks on U.S. and Mexican Organizations
Mar 26, 2025Ravie LakshmananMalware / Vulnerability The Chinese threat actor known as…
EncryptHub Exploits Windows Zero-Day to Deploy Rhadamanthys and StealC Malware
Mar 26, 2025Ravie LakshmananWindows Security / Vulnerability The threat actor known as…
Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks
Mar 26, 2025Ravie LakshmananBrowser Security / Vulnerability Google has released out-of-band fixes…
Researchers Uncover ~200 Unique C2 Domains Linked to Raspberry Robin Access Broker
Mar 25, 2025Ravie LakshmananThreat Intelligence / Malware A new investigation has unearthed…
Hackers Use .NET MAUI to Target Indian and Chinese Users with Fake Banking, Social Apps
Mar 25, 2025Ravie LakshmananMobile Security / Data Theft Cybersecurity researchers are calling…
Kaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 Servers
Mar 21, 2025Ravie LakshmananMalware / Cyber Attack Two known threat activity clusters…
10-Month Campaign, 7 Global Targets, 5 Malware Families
Mar 21, 2025Ravie LakshmananCybercrime / Cyber Espionage The China-linked advanced persistent threat…