Top 5 AI-Powered Social Engineering Attacks
Social engineering has long been an effective tactic because of how it…
PureCrypter Deploys Agent Tesla and New TorNet Backdoor in Ongoing Cyberattacks
Jan 28, 2025Ravie LakshmananPhishing Attack / Network Security A financially motivated threat…
16 Chrome Extensions Hacked, Exposing Over 600,000 Users to Data Theft
Dec 29, 2025Ravie LakshmananEndpoint Protection / Browser Security A new attack campaign…
Over 80% of Targets Found in Russia
Dec 27, 2024Ravie LakshmananCyber Attack / Data Theft The threat actor known…
HubPhish Exploits HubSpot Tools to Target 20,000 European Users for Credential Theft
Dec 18, 2024Ravie LakshmananEmail Security / Cloud Security Cybersecurity researchers have disclosed…
Hackers Use Microsoft MSC Files to Deploy Obfuscated Backdoor in Pakistan Attacks
Dec 17, 2024Ravie LakshmananCyber Attack / Malware A new phishing campaign has…
390,000+ WordPress Credentials Stolen via Malicious GitHub Repository Hosting PoC Exploits
Dec 13, 2024Ravie LakshmananCyber Attack / Malware A now-removed GitHub repository that…
Horns&Hooves Campaign Delivers RATs via Fake Emails and JavaScript Payloads
Dec 03, 2024Ravie LakshmananMalware / Phishing Attack A newly discovered malware campaign…
Phishing-as-a-Service “Rockstar 2FA” Targets Microsoft 365 Users with AiTM Attacks
Nov 29, 2024Ravie LakshmananCybercrime / Cloud Security Cybersecurity researchers are warning about…