CoffeeLoader Uses GPU-Based Armoury Packer to Evade EDR and Antivirus Detection
Mar 28, 2025Ravie LakshmananEndpoint Security / Threat Intelligence Cybersecurity researchers are calling…
New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials
Mar 29, 2025Ravie LakshmananThreat Intelligence / Mobile Security Cybersecurity researchers have discovered…
BlackLock Ransomware Exposed After Researchers Exploit Leak Site Vulnerability
Mar 29, 2025Ravie LakshmananCybercrime / Vulnerability In what's an instance of hacking…
New Morphing Meerkat Phishing Kit Mimics 114 Brands Using Victims’ DNS Email Records
Mar 27, 2025Ravie LakshmananEmail Security / Malware Cybersecurity researchers have shed light…
CISA Warns of Sitecore RCE Flaws; Active Exploits Hit Next.js and DrayTek Devices
Mar 27, 2025Ravie LakshmananVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure…
New SparrowDoor Backdoor Variants Found in Attacks on U.S. and Mexican Organizations
Mar 26, 2025Ravie LakshmananMalware / Vulnerability The Chinese threat actor known as…
Researchers Uncover ~200 Unique C2 Domains Linked to Raspberry Robin Access Broker
Mar 25, 2025Ravie LakshmananThreat Intelligence / Malware A new investigation has unearthed…
Microsoft Adds Inline Data Protection to Edge for Business to Block GenAI Data Leaks
Mar 24, 2025Ravie LakshmananEnterprise Security / Browser Security Microsoft on Monday announced…
Kaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 Servers
Mar 21, 2025Ravie LakshmananMalware / Cyber Attack Two known threat activity clusters…