-
Resecurity has identified PDFSIDER malware that exploits the legitimate PDF24 App to covertly steal data and allow remote access. Learn how this APT-level campaign targets corporate networks through spear-phishing and encrypted communications.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers have found a new spying campaign using news about Venezuela to trick US government officials. Learn how the LOTUSLITE virus sneaks into computers to steal secrets.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The activist website called “ICE List” was offline after a massive DDoS attack. The crash followed a leak of 4,500 federal agent names linked to the Renee Nicole Good shooting.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A supply chain vulnerability in AWS CodeBuild recently put the entire AWS Console at risk. Learn how Wiz Research found the flaw and how Amazon responded to prevent a global security crisis.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Dutch police arrest the alleged AVCheck operator at Schiphol as part of Operation Endgame, a global effort targeting malware services and cybercrime.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Hackread.com exclusive: Scammers are using verified PayPal invoices to launch callback phishing attacks. Learn how the “Alexzander” invoice bypasses Google filters.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers uncover a 5-year malware campaign using browser extensions on Chrome, Firefox and Edge, relying on hidden payloads and shared infrastructure.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
ANY.RUN report reveals how the new CastleLoader malware targets US government agencies using stealthy ClickFix tricks and memory-based attacks to bypass security.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Over 387,000 users downloaded vulnerable Apache Struts versions this week. Exclusive Sonatype research reveals a high-risk flaw found by AI. Is your system at risk?
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers have discovered VoidLink, a sophisticated new Linux malware framework designed to infiltrate AWS, Google Cloud, and Azure. Learn how this Chinese-affiliated toolkit uses adaptive stealth to stay hidden.
·
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


