Security & Cyber
LIVEVulnerabilities, threat intelligence, and security advisories
Kimwolf Botnet Swamps Anonymity Network I2P
HIGHKimwolf Botnet Overwhelms I2P Anonymity Network
APT36 and SideCopy Launch Cross-Platform RAT Campaigns Against Indian Entities
HIGHAPT36 and SideCopy Launch Cross-Platform RAT Campaigns Targeting Indian Entities
Exposed Training Open the Door for Crypto-Mining in Fortune 500 Cloud Environments
HIGHVulnerable Training Apps Open Crypto-Mining Risks in Cloud Environments
North Korea-Linked UNC1069 Uses AI Lures to Attack Cryptocurrency Organizations
HIGHUNC1069 Exploits AI Lures in Cryptocurrency Heist
New Linux botnet SSHStalker uses old-school IRC for C2 comms
HIGHSSHStalker Botnet Revives IRC for Linux C2 Operations
North Korean hackers use new macOS malware in crypto-theft attacks
HIGHNorth Korean Hackers Deploy New macOS Malware in Cryptocurrency Heists
Malicious 7-Zip site distributes installer laced with proxy tool
HIGHFake 7-Zip Site Distributes Trojanized Installer with Proxy Tool
DPRK Operatives Impersonate Professionals on LinkedIn to Infiltrate Companies
HIGHDPRK Agents Exploit LinkedIn for Corporate Infiltration
Manipulating AI memory for profit: The rise of AI Recommendation Poisoning
HIGHAI Recommendation Poisoning: A New Threat to AI Memory Integrity
Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools
HIGHReynolds Ransomware Uses Vulnerable Drivers to Evade Security
From Ransomware to Residency: Inside the Rise of the Digital Parasite
HIGHThe Silent Shift: Ransomware Evolves into a Digital Residency Threat
Fugitive behind $73M 'pig butchering' scheme gets 20 years in prison
HIGHInternational Cryptocurrency Fraudster Sentenced to 20 Years
Showing 325-336 of 370 articles