The FBI is offering $10 million for information about the China-state hacking group tracked as Salt Typhoon and its intrusion […]
Category: Security
North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures
North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to distribute malware during […]
New Critical SAP NetWeaver Flaw Exploited to Drop Web Shell, Brute Ratel Framework
Apr 25, 2025Ravie LakshmananVulnerability / Enterprise Security Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload […]
Why NHIs Are Security’s Most Dangerous Blind Spot
When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA prompt. But lurking […]
From compliance to culture: Making security part of our daily routines
Every organization, sooner or later, writes itself a policy. It gets stapled into onboarding packs and waved about during training, […]
Researchers Identify Rack::Static Vulnerability Enabling Data Breaches in Ruby Servers
Apr 25, 2025Ravie LakshmananVulnerability / Data Breach Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server […]
DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks
Apr 25, 2025Ravie LakshmananVulnerability / Network Security Cybersecurity researchers are warning about a new malware called DslogdRAT that’s installed following […]
New Android spyware is targeting Russian military personnel on the front lines
Russian military personnel are being targeted with recently discovered Android malware that steals their contacts and tracks their location. The […]
Lazarus Hits 6 South Korean Firms via Cross EX, Innorix Flaws and ThreatNeedle Malware
Apr 24, 2025Ravie LakshmananMalware / Threat Intelligence At least six organizations in South Korea have been targeted by the prolific […]
159 CVEs Exploited in Q1 2025 — 28.3% Within 24 Hours of Disclosure
Apr 24, 2025Ravie LakshmananVulnerability / Threat Intelligence As many as 159 CVE identifiers have been flagged as exploited in the […]