Mustang Panda Targets Myanmar With StarProxy, EDR Bypass, and TONESHELL Updates
The China-linked threat actor known as Mustang Panda has been attributed to…
Experts Uncover Four New Privilege Escalation Flaws in Windows Task Scheduler
Apr 16, 2025Ravie LakshmananEndpoint Security / Vulnerability Cybersecurity researchers have detailed four…
Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool
Apr 15, 2025Ravie LakshmananLinux / Malware The China-linked threat actor known as…
Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft
Apr 14, 2025Ravie LakshmananEmail Security / Cyber Attack Cybersecurity researchers are calling…
ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading
Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT…
Pakistan-Linked Hackers Expand Targets in India with CurlBack RAT and Spark RAT
Apr 14, 2025Ravie LakshmananCyber Attack / Malware A threat actor with ties…
CTM360 Uncovers a Play Masquerading Party
Overview of the PlayPraetor Masquerading Party Variants CTM360 has now identified a…
OttoKit WordPress Plugin Admin Creation Vulnerability Under Active Exploitation
Apr 11, 2025Ravie LakshmananWebsite Security / Vulnerability A newly disclosed high-severity security…
SpyNote, BadBazaar, MOONSHINE Malware Target Android and iOS Users via Fake Apps
Cybersecurity researchers have found that threat actors are setting up deceptive websites…