LockBit Operators Use Stealthy DLL Sideloading to Mask Malicious App as Legitimate One2 days agoBy Aman MishraMore
Chinese Threat Actors Hack 11,000 Android Devices to Deploy PlayPraetor Malware2 days agoBy Aman MishraMore
LLMs Boost Offensive R&D by Identifying and Exploiting Trapped COM Objects2 days agoBy Aman MishraMore
Unit 42 Launches Attribution Framework to Classify Threat Actors by Behavior and Activity3 days agoBy Aman MishraMore
LAMEHUG: First AI-Powered Malware Targets Organizations via Compromised Official Email Accounts3 days agoBy Aman MishraMore
New DoubleTrouble Banking Malware Targets Users Through Phishing Sites to Steal Credentials3 days agoBy Aman MishraMore
Anubis Ransomware Targets Android and Windows Users to Encrypt Files and Steal Credentials3 days agoBy Aman MishraMore
Chinese Silk Typhoon Hackers File Over 10 Patents for Advanced Intrusive Hacking Tools3 days agoBy Aman MishraMore
APT36 Hackers Target Indian Railways, Oil, and Government Systems Using Malicious PDF Files2 days agoBy Aman MishraMore
Lazarus Group Enhances Malware with New OtterCookie Payload Delivery Technique4 days agoBy Lucas Humberto MancilhaMore
Microsoft SharePoint Server 0-Day Exploit Targets African Treasury, Companies, and University4 days agoBy Aman MishraMore
New Spear Phishing Attack Distributes VIP Keylogger Through Email Attachment4 days agoBy Aman MishraMore
NOVABLIGHT Masquerades as Educational Tool to Steal Login Credentials and Compromise Crypto Wallets3 days agoBy Aman MishraMore
LLM Honeypots Can Deceive Threat Actors into Exposing Binaries and Known Exploits4 days agoBy Aman MishraMore
North Korean APT Hackers Compromise CI/CD Pipelines to Steal Sensitive Data3 days agoBy Aman MishraMore
Apple Patches Multiple Vulnerabilities, Including Safari Vulnerability Abused in Chrome 0-Day Attacks4 days agoMore
New Gunra Ransomware Linux Variant Launches 100 Encryption Threads with Partial Encryption Feature4 days agoBy Aman MishraMore
CrushFTP Hit by Critical 0-Day RCE Vulnerability – Full Technical Details and PoC Published3 days agoMore
New XWorm V6 Variant with Anti-Analysis Features Targeting Windows Users in Active Attacks5 days agoBy Aman MishraMore
Threat Actors Impersonate Microsoft OAuth Apps to Steal Login Credentials2 days agoBy Aman MishraMore
Unveiling the Lumma Password Stealer Attack: Infection Chain and Escalation Tactics Exposed5 days agoBy Aman MishraMore
Qwins Ltd: Bulletproof Hosting Provider Powering Global Malware Campaigns5 days agoBy Aman MishraMore
CISA and FBI Release Tactics, Techniques, and Procedures of the Scattered Spider Hacker Group4 days agoBy Aman MishraMore
Unveiling 0bj3ctivityStealer’s Execution Chain: New Capabilities and Exfiltration Techniques Exposed5 days agoBy Aman MishraMore