China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns
China's National Computer Virus Emergency Response Center (CVERC) has doubled down on…
Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration
Oct 14, 2024Ravie LakshmananNetwork Security / Vulnerability A suspected nation-state adversary has…
Cybercriminals Use Unicode to Hide Mongolian Skimmer in E-Commerce Platforms
Oct 10, 2024Ravie LakshmananCybercrime / Malware Cybersecurity researchers have shed light on…
CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance
Oct 11, 2024Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure…
Microsoft Issues Security Update Fixing 118 Flaws, Two Actively Exploited in the Wild
Oct 09, 2024Ravie LakshmananVulnerability / Zero-Day Microsoft has released security updates to…
New Gorilla Botnet Launches Over 300,000 DDoS Attacks Across 100 Countries
Oct 07, 2024Ravie LakshmananIoT Security / Botnet Cybersecurity researchers have discovered a…
North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks
Oct 03, 2024Ravie LakshmananCyber Espionage / Threat Intelligence Threat actors with ties…
Free Sniper Dz Phishing Tools Fuel 140,000+ Cyber Attacks Targeting User Credentials
More than 140,000 phishing websites have been found linked to a phishing-as-a-service…
AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition
The threat actors behind the Rhadamanthys information stealer have added new advanced…


