Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive
Nov 03, 2025Ravie LakshmananCryptocurrency / Threat Intelligence Cybersecurity researchers have flagged a…
Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
Oct 31, 2025Ravie LakshmananMalware / Secure Coding Eclipse Foundation, which maintains the…
CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
Oct 31, 2025Ravie LakshmananVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure…
China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
Oct 31, 2025Ravie LakshmananEndpoint Security / Cyber Espionage The exploitation of a…
ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability
Nov 01, 2025Ravie LakshmananArtificial Intelligence / Vulnerability The Australian Signals Directorate (ASD)…
Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
Oct 31, 2025Ravie LakshmananMalware / Browser Security A suspected nation-state threat actor…
China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
Oct 31, 2025Ravie LakshmananMalware / Threat Intelligence A China-affiliated threat actor known…
Experts Reports Sharp Increase in Automated Botnet Attacks Targeting PHP Servers and IoT Devices
Oct 29, 2025Ravie LakshmananVulnerability / Internet of Things Cybersecurity researchers are calling…
New Android Trojan ‘Herodotus’ Outsmarts Anti-Fraud Systems by Typing Like a Human
Oct 28, 2025Ravie LakshmananMalware / Mobile Security Cybersecurity researchers have disclosed details…


