Malicious Go Module Poses as SSH Brute-Force Tool, Steals Credentials via Telegram Bot
Aug 24, 2025Ravie LakshmananMalware / Supply Chain Security Cybersecurity researchers have discovered…
Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage
Cybersecurity researchers are calling attention to malicious activity orchestrated by a China-nexus…
Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
Aug 09, 2025Ravie LakshmananVulnerability / Hardware Security Cybersecurity researchers have disclosed vulnerabilities…
How to Stop Python Supply Chain Attacks—and the Expert Tools You Need
Aug 07, 2025The Hacker NewsDevSecOps / Supply Chain Security Python is everywhere…
The Wild West of Shadow IT
Everyone's an IT decision-maker now. The employees in your organization can install…
U.S. Sanctions Firm Behind N. Korean IT Scheme; Arizona Woman Jailed for Running Laptop Farm
Jul 25, 2025Ravie LakshmananCybercrime / Insider Threat The U.S. Department of the…
Critical Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Attacks
Jun 26, 2025Ravie LakshmananOpen Source / Vulnerability Cybersecurity researchers have disclosed a…
Scattered Spider Behind Cyberattacks on M&S and Co-op, Causing Up to $592M in Damages
Jun 21, 2025Ravie LakshmananCyber Attack / Critical Infrastructure The April 2025 cyber…
Iran’s State TV Hijacked Mid-Broadcast Amid Geopolitical Tensions; $90M Stolen in Crypto Heist
Jun 20, 2025Ravie LakshmananCyber Warfare / Hacktivism Iran's state-owned TV broadcaster was…


