Microsoft Uncovers Sandworm Subgroup’s Global Cyber Attacks Spanning 15+ Countries
A subgroup within the infamous Russian state-sponsored hacking group known as Sandworm…
North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack
Feb 12, 2025Ravie LakshmananIT Security / Cybercrime The North Korea-linked threat actor…
Hackers Exploit Google Tag Manager to Deploy Credit Card Skimmers on Magento Stores
Feb 10, 2025Ravie LakshmananMalware / Payment Security Threat actors have been observed…
SparkCat Malware Uses OCR to Extract Crypto Wallet Recovery Phrases from Images
A new malware campaign dubbed SparkCat has leveraged a suit of bogus…
Hackers Exploiting SimpleHelp RMM Flaws for Persistent Access and Ransomware
Feb 07, 2025Ravie LakshmananVulnerability / Threat Intelligence Threat actors have been observed…
Microsoft Identifies 3,000 Leaked ASP.NET Keys Enabling Code Injection Attacks
Feb 07, 2025Ravie LakshmananCloud Security / Web Security Microsoft is warning of…
Malicious ML Models on Hugging Face Leverage Broken Pickle Format to Evade Detection
Feb 08, 2025Ravie LakshmananArtificial Intelligence / Supply Chain Security Cybersecurity researchers have…
DeepSeek App Transmits Sensitive User and Device Data Without Encryption
Feb 07, 2025Ravie LakshmananMobile Security / Artificial Intelligence A new audit of…
CISA Warns of Active Exploits Targeting Trimble Cityworks Vulnerability
Feb 07, 2025The Hacker NewsVulnerability / Malware The U.S. Cybersecurity and Infrastructure…


