Mar 26, 2025Ravie LakshmananWindows Security / Vulnerability The threat actor known as EncryptHub exploited a recently-patched security vulner...
Category: Attack
Mar 26, 2025Ravie LakshmananSupply Chain Attack / Malware Cybersecurity researchers have discovered two malicious packages on the npm registry...
When people think of cybersecurity threats, they often picture external hackers breaking into networks. However, some of the most damaging breac...
Mar 26, 2025Ravie LakshmananPassword Security / Cybercrime Threat actors are leveraging an e-crime tool called Atlantis AIO Multi-Checker to a...
Mar 26, 2025Ravie LakshmananVulnerability / Data Security Broadcom has issued security patches to address a high-severity security flaw in VMw...
Mar 26, 2025Ravie LakshmananBrowser Security / Vulnerability Google has released out-of-band fixes to address a high-severity security flaw in...
Mar 25, 2025Ravie LakshmananThreat Intelligence / Malware A new investigation has unearthed nearly 200 unique command-and-control (C2) domains...
Mar 25, 2025Ravie LakshmananCyber Espionage / Network Security A major telecommunications company located in Asia was allegedly breached by Ch...
Organizations now use an average of 112 SaaS applications—a number that keeps growing. In a 2024 study, 49% of 644 respondents who frequently us...
Mar 25, 2025Ravie LakshmananMobile Security / Data Theft Cybersecurity researchers are calling attention to an Android malware campaign that l...