DLL side-loading delivers Yokai backdoor targeting Thai officials, leveraging spear-phishing lures and persistent malware ...
Germany's BSI disrupts BADBOX malware targeting 30,000 devices, halting ad fraud, data theft, and proxy misuse.
The malware has been codenamed IOCONTROL by OT cybersecurity company Claroty, highlighting its ability to attack IoT and ...
The U.S. Department of Justice (DoJ) has indicted 14 nationals belonging to the Democratic People's Republic of Korea (DPRK ...
"The Rydox marketplace has conducted over 7,600 sales of personally identifiable information (PII), stolen access devices, ...
Attackers exploit Hunk Companion vulnerability (CVE-2024-11972) to install flawed plugins, enabling RCE attacks on 10,000+ ...
PUMAKIT, a stealthy Linux rootkit, uses syscall hooking, memory-resident execution, and advanced privilege escalation techniques.
The vulnerability, tracked as CVE-2024-54143, carries a CVSS score of 9.3 out of a maximum of 10, indicating critical severity. Flatt Security researcher RyotaK has been credited with discovering and ...
China-based threat actors target Southeast Asia organizations with advanced tools like PlugX and reverse proxies.
Chinese hacker charged for exploiting Sophos firewalls via CVE-2020-12271; U.S. sanctions cybersecurity firm Sichuan Silence.
SaaS budgets are wasted, costing $1,000–$3,500 per employee. Reclaim costs, boost ROI, and plan for 2025 effectively.
PowerOFF dismantles 27 DDoS stresser services, arrests administrators, and exposes CDN/WAF misconfiguration risks.