Gold Melody IAB Exploits Exposed ASP.NET Machine Keys for Unauthorized Access to Targets
Jul 09, 2025Ravie LakshmananCyber Threat / Malware The Initial Access Broker (IAB)…
U.S. Sanctions North Korean Andariel Hacker Behind Fraudulent IT Worker Scheme
The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC)…
Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
Cybersecurity researchers have discovered an Android banking malware campaign that has leveraged…
Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
Jul 08, 2025Ravie LakshmananMalware / Cybercrime In yet another instance of threat…
Researchers Uncover Batavia Windows Spyware Stealing Documents from Russian Firms
Jul 08, 2025Ravie LakshmananCyber Espionage / Threat Intelligence Russian organizations have been…
SEO Poisoning Campaign Targets 8,500+ SMB Users with Malware Disguised as AI Tools
Cybersecurity researchers have disclosed a malicious campaign that leverages search engine optimization…
TAG-140 Deploys DRAT V2 RAT, Targeting Indian Government, Defense, and Rail Sectors
A hacking group with ties other than Pakistan has been found targeting…
Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS
Threat actors are weaponizing exposed Java Debug Wire Protocol (JDWP) interfaces to…
Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms
Jul 03, 2025Ravie LakshmananThreat Intelligence / Vulnerability The French cybersecurity agency on…


