News Feed

Ransomware Extortion Drops to $813.5M in 2024, Down fro...

Ransomware attacks netted cybercrime groups a total of $813.5 million in 2024, a...

SparkCat Malware Uses OCR to Extract Crypto Wallet Reco...

A new malware campaign dubbed SparkCat has leveraged a suit of bogus apps on bot...

The Evolving Role of PAM in Cybersecurity Leadership Ag...

Privileged Access Management (PAM) has emerged as a cornerstone of modern cybers...

North Korean APT Kimsuky Uses forceCopy Malware to Stea...

The North Korea-linked nation-state hacking group known as Kimsuky has been obse...

Top 3 Ransomware Threats Active in 2025

You arrive at the office, power up your system, and panic sets in. Every file is...

Cisco Patches Critical ISE Vulnerabilities Enabling Roo...

Cisco has released updates to address two critical security flaws Identity Servi...

Cross-Platform JavaScript Stealer Targets Crypto Wallet...

The North Korea-linked Lazarus Group has been linked to an active campaign that ...

Cybercriminals Use Go Resty and Node Fetch in 13 Millio...

Cybercriminals are increasingly leveraging legitimate HTTP client tools to facil...

Silent Lynx Using PowerShell, Golang, and C++ Loaders i...

A previously undocumented threat actor known as Silent Lynx has been linked to c...

New Veeam Flaw Allows Arbitrary Code Execution via Man-...

Veeam has released patches to address a critical security flaw impacting its Bac...

Navigating the Future: Key IT Vulnerability Management ...

As the cybersecurity landscape continues to evolve, proactive vulnerability mana...

AsyncRAT Campaign Uses Python Payloads and TryCloudflar...

A malware campaign has been observed delivering a remote access trojan (RAT) nam...

CISA Adds Four Actively Exploited Vulnerabilities to KE...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday adde...

Malicious Go Package Exploits Module Mirror Caching for...

Cybersecurity researchers have called attention to a software supply chain attac...

Russian Cybercrime Groups Exploiting 7-Zip Flaw to Bypa...

A recently patched security vulnerability in the 7-Zip archiver tool was exploit...

North Korean Hackers Deploy FERRET Malware via Fake Job...

The North Korean threat actors behind the Contagious Interview campaign have bee...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.