Skip to content
Friday, May 1, 2026
The TechBriefs
  • Home
  • Technology
  • AI
  • Computers
  • Security
  • Internet
  • Press Releases
    • GlobeNewswire
    • PRNewswire
  • Contact

Category: Hackers

  • Home
  • Hackers
  • Page 4
Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
  • Hackers
  • Security

Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

  • 0

Jul 17, 2025Ravie LakshmananMalware / Social Engineering Threat actors are leveraging public GitHub repositories to host malicious payloads and distribute […]

Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner
  • Hackers
  • Security

Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner

  • 0

Jul 17, 2025Ravie LakshmananCryptocurrency / Vulnerability Cybersecurity researchers have discovered a new campaign that exploits a known security flaw impacting […]

Google finds custom backdoor being installed on SonicWall network devices
  • Biz & IT
  • Hackers
  • Security
  • SonicWall
  • Technology
  • vulnerabilities

Google finds custom backdoor being installed on SonicWall network devices

  • 0

Researchers from the Google Threat Intelligence Group said that hackers are compromising SonicWall Secure Mobile Access (SMA) appliances, which sit […]

Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms
  • Hackers
  • Security

Hackers Leverage Microsoft Teams to Spread Matanbuchus 3.0 Malware to Targeted Firms

  • 0

Jul 16, 2025Ravie LakshmananThreat Intelligence / Vulnerability Cybersecurity researchers have flagged a new variant of a known malware loader called […]

Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Hackers
  • Security

Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware

  • 0

Jul 08, 2025Ravie LakshmananMalware / Cybercrime In yet another instance of threat actors repurposing legitimate tools for malicious purposes, it […]

Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
  • Hackers
  • Security

Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns

  • 0

Cybersecurity researchers are calling attention to phishing campaigns that impersonate popular brands and trick targets into calling phone numbers operated […]

Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers
  • Hackers
  • Security

Hackers Target Over 70 Microsoft Exchange Servers to Steal Credentials via Keyloggers

  • 0

Jun 24, 2025Ravie LakshmananVulnerability / Malware Unidentified threat actors have been observed targeting publicly exposed Microsoft Exchange servers to inject […]

Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network
  • Hackers
  • Security

Hackers Exploit Misconfigured Docker APIs to Mine Cryptocurrency via Tor Network

  • 0

Jun 24, 2025Ravie LakshmananCloud Security / Cryptojacking Misconfigured Docker instances are the target of a campaign that employs the Tor […]

  • Hackers
  • Security

Mimo Hackers Exploit CVE-2025-32432 in Craft CMS to Deploy Cryptominer and Proxyware

  • 0

May 28, 2025Ravie LakshmananCryptojacking / Vulnerability A financially motivated threat actor has been observed exploiting a recently disclosed remote code […]

Hackers Are Calling Your Office: FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign
  • Hackers
  • Security

Hackers Are Calling Your Office: FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign

  • 0

May 27, 2025Ravie LakshmananData Breach / Social Engineering The U.S. Federal Bureau of Investigation (FBI) has warned of social engineering […]

Posts pagination

Previous 1 … 3 4 5 … 7 Next
  • Privacy Policy
  • Terms of use
Theme: Terminal News By Adore Themes.