See Threats to Your Industry & Country in Real Time
Modern security teams often feel like they're driving through fog with failing…
New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale
Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime…
Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories
Dec 11, 2025Ravie Lakshmanan This week's cyber stories show how fast the…
Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure
Dec 09, 2025Ravie LakshmananCybersecurity / Malware Four distinct threat activity clusters have…
Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT
Cybersecurity researchers are calling attention to a new campaign dubbed JS#SMUGGLER that…
Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
Dec 04, 2025Ravie LakshmananCybersecurity / Hacking News Think your Wi-Fi is safe?…
Brazil Hit by Banking Trojan Spread via WhatsApp Worm and RelayNFC NFC Relay Fraud
The threat actor known as Water Saci is actively evolving its tactics,…
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse
Dec 02, 2025Ravie LakshmananRegulatory Compliance / Online Safety India's Department of Telecommunications…
AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
Nov 27, 2025Ravie LakshmananCybersecurity / Hacking News Hackers have been busy again…


