How ‘Browser-in-the-Middle’ Attacks Steal Sessions in Seconds
May 28, 2025The Hacker NewsBrowser Security / Credential Theft Would you expect…
Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
May 09, 2025Ravie LakshmananMalware / Email Security Cybersecurity researchers are warning of…
Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft
Apr 14, 2025Ravie LakshmananEmail Security / Cyber Attack Cybersecurity researchers are calling…
Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp
The threat actors behind the zero-day exploitation of a recently-patched security vulnerability…
CISA Adds Critical Flaw in BeyondTrust Software to Exploited Vulnerabilities List
Dec 20, 2024Ravie LakshmananCISA / Vulnerability The U.S. Cybersecurity and Infrastructure Security…
Black Basta Ransomware Evolves with Email Bombing, QR Codes, and Social Engineering
Dec 09, 2024Ravie LakshmananThreat Intelligence / Malware The threat actors linked to…
New CRON#TRAP Malware Infects Windows by Hiding in Linux VM to Evade Antivirus
Nov 08, 2024Ravie LakshmananMalware / Virtualization Cybersecurity researchers have flagged a new…
VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware
Nov 06, 2024Ravie LakshmananSaaS Security / Threat Detection An ongoing threat campaign…


