Oct 24, 2025Ravie LakshmananData Breach / Cybercrime The threat actors behind a large-scale, ongoing smishing campaign have been attributed to […]
Category: Security
Newly Patched Critical Microsoft WSUS Flaw Comes Under Active Exploitation
Microsoft on Thursday released out-of-band security updates to patch a critical-severity Windows Server Update Service (WSUS) vulnerability with a proof-of-concept […]
This browser claims “perfect privacies protection,” but it acts like malware
Researchers note links to Asia’s booming cybercrime and illegal gambling networks. This looks like a 100 percent above-board product, right? […]
APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign
Oct 24, 2025Ravie LakshmananCyber Espionage / Malware A Pakistan-nexus threat actor has been observed targeting Indian government entities as part […]
The Cybersecurity Perception Gap: Why Executives and Practitioners See Risk Differently
Does your organization suffer from a cybersecurity perception gap? Findings from the Bitdefender 2025 Cybersecurity Assessment suggest the answer is […]
3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation
Oct 24, 2025Ravie LakshmananMalware / Hacking News A malicious network of YouTube accounts has been observed publishing and promoting videos […]
Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack
Oct 24, 2025Ravie LakshmananDevOps / Malware Cybersecurity researchers have discovered a self-propagating worm that spreads via Visual Studio Code (VS […]
North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets
Oct 23, 2025Ravie LakshmananCyber Espionage / Threat Intelligence Threat actors with ties to North Korea have been attributed to a […]
Secure AI at Scale and Speed — Learn the Framework in this Free Webinar
Oct 23, 2025The Hacker NewsArtificial Intelligence / Data Protection AI is everywhere—and your company wants in. Faster products, smarter systems, […]
ThreatsDay Bulletin: $176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More
Criminals don’t need to be clever all the time; they just follow the easiest path in: trick users, exploit stale […]
