Glutton malware by APT41 targets PHP systems globally, exploiting frameworks like Laravel and ThinkPHP, with unencrypted C2 ...
The malware has been codenamed IOCONTROL by OT cybersecurity company Claroty, highlighting its ability to attack IoT and ...
The Security Service of Ukraine (SBU or SSU) has exposed a novel espionage campaign suspected to be orchestrated by Russia's ...
Malicious actors are exploiting a critical vulnerability in the Hunk Companion plugin for WordPress to install other ...
Germany's BSI disrupts BADBOX malware targeting 30,000 devices, halting ad fraud, data theft, and proxy misuse.
DLL side-loading delivers Yokai backdoor targeting Thai officials, leveraging spear-phishing lures and persistent malware ...
PUMAKIT, a stealthy Linux rootkit, uses syscall hooking, memory-resident execution, and advanced privilege escalation techniques.
"The Rydox marketplace has conducted over 7,600 sales of personally identifiable information (PII), stolen access devices, ...
The yawpp GitHub project is said to have enabled the exfiltration of over 390,000 credentials, likely for WordPress accounts, ...
The vulnerability, tracked as CVE-2024-54143, carries a CVSS score of 9.3 out of a maximum of 10, indicating critical severity. Flatt Security researcher RyotaK has been credited with discovering and ...
The U.S. Department of Justice (DoJ) has indicted 14 nationals belonging to the Democratic People's Republic of Korea (DPRK ...
Automate CrowdStrike RFM reporting with Tines' AI workflow, saving 25+ hours annually while improving accuracy.