Researchers Uncover ~200 Unique C2 Domains Linked to Raspberry Robin Access Broker
Mar 25, 2025Ravie LakshmananThreat Intelligence / Malware A new investigation has unearthed…
Microsoft Adds Inline Data Protection to Edge for Business to Block GenAI Data Leaks
Mar 24, 2025Ravie LakshmananEnterprise Security / Browser Security Microsoft on Monday announced…
Kaspersky Links Head Mare to Twelve, Targeting Russian Entities via Shared C2 Servers
Mar 21, 2025Ravie LakshmananMalware / Cyber Attack Two known threat activity clusters…
10-Month Campaign, 7 Global Targets, 5 Malware Families
Mar 21, 2025Ravie LakshmananCybercrime / Cyber Espionage The China-linked advanced persistent threat…
Leaked Black Basta Chats Suggest Russian Officials Aided Leader’s Escape from Armenia
Mar 19, 2025Ravie LakshmananCybercrime / Threat Intelligence The recently leaked trove of…
Hackers Exploit Severe PHP Flaw to Deploy Quasar RAT and XMRig Miners
Mar 19, 2025Ravie LakshmananThreat Intelligence / Cryptojacking Threat actors are exploiting a…
A Stealthy RAT Targeting Credentials and Crypto Wallets
Microsoft is calling attention to a novel remote access trojan (RAT) named…
Apache Tomcat Vulnerability Actively Exploited Just 30 Hours After Public Disclosure
Mar 17, 2025Ravie LakshmananVulnerability / Web Security A recently disclosed security flaw…
Unpatched Edimax Camera Flaw Exploited for Mirai Botnet Attacks Since Last Year
Mar 17, 2025Ravie LakshmananBotnet / Vulnerability An unpatched security flaw impacting the…