Ballista botnet exploits TP-Link router flaw CVE-2023-1389, infecting 6,000+ devices worldwide and evolving to use TOR.
Blind Eagle targeted 1,600 victims in Colombia using spear-phishing, exploiting CVE-2024-43451, and distributing malware via ...
CISA Adds Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM to KEV List | Read more hacking news ...
Cybercriminals use steganography to hide malware inside images, evading security tools and enabling stealthy attacks. Learn ...
Compliance isn’t security. Adversarial Exposure Validation reveals exploitable vulnerabilities, helping teams cut through the ...
SideWinder APT expands attacks on maritime, nuclear, and IT sectors, rapidly modifying malware to evade detection.
The activity, attributed to a threat actor dubbed Desert Dexter, was discovered in February 2025. It chiefly involves ...
Moxa fixes CVE-2024-12297, a critical PT switch flaw (CVSS 9.2) enabling authentication bypass. Users must update firmware or ...
Hackers use polymorphic browser extensions to mimic real add-ons, steal credentials, and hijack accounts. Affects Chrome, ...
CTM360 detects 6,000+ fake Google Play pages spreading PlayPraetor malware, stealing banking credentials and MFA codes for ...
In today's threat landscape, identity security demands more than just prevention. By combining SSPM with ITDR, organizations ...
SilentCryptoMiner infects 2,000 users by posing as a restriction bypass tool, leveraging YouTube and Telegram for distribution.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results