-
A newly emerging malware known as GhostSocks is quietly reshaping how attackers evade detection by converting compromised systems into residential proxy nodes. Modern cyberattacks rely heavily on blending into normal network traffic. Residential proxie…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Notepad++ rolled out version 8.9.3, an important update addressing a notable cURL security vulnerability and resolving multiple crash bugs. Alongside these vital security patches, this release marks the official completion of the application’s migratio…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Russian hackers are using a new remote access toolkit called “CTRL” to silently hijack Remote Desktop Protocol (RDP) sessions via FRP-based reverse tunnels, enabling stealthy, hands-on access to compromised Windows systems. The toolkit blends credentia…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A fully operational TheGentlemen ransomware toolkit on an exposed server, revealing victim credentials, ngrok tokens, and a complete pre-encryption playbook. This led them to an unauthenticated HTTP server at 176.120.22[.]127:80, hosted by Russian bull…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A recent investigation as exposed how a suspected North Korean IT worker allegedly used a stolen identity, AI-generated resume content, and scripted interview answers to try to secure a senior remote role at U.S.-based threat intelligence firm Nisos. T…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
CrySome RAT is a newly observed, advanced .NET remote access trojan that combines full‑featured post‑exploitation tooling with unusually hardened persistence, AV-killing, and anti‑removal logic, making it a serious long‑term threat to Windows environme…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Starting April 1, 2026, the Indian government will officially enforce a nationwide ban on the sale of internet-connected CCTV cameras from major Chinese manufacturers, including Hikvision, Dahua, and TP-Link. This decisive market restriction is fundame…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A new variant of the ClickFix attack technique that shifts execution away from commonly monitored tools like PowerShell and mshta, instead abusing native Windows components such as rundll32.exe and WebDAV. This evolution allows attackers to bypass trad…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A severe security flaw has been disclosed in Smart Slider 3, a highly popular WordPress plugin currently active on more than 800,000 websites. Discovered by security researcher Dmitrii Ignatyev, this vulnerability enables authenticated attackers to rea…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
TA446, a Russia-linked espionage group, has started using the DarkSword exploit kit to compromise iOS devices in a new phishing wave that abuses Atlantic Council‑themed lures. The campaign underscores how quickly leaked iOS exploit chains can be weapon…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


