Cybersecurity researchers are calling attention to multiple campaigns that leverage known security vulnerabilities and expose Redis servers to various malicious […]
Category: Security
Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection
Cybersecurity researchers have shed light on a novel attack chain that employs phishing emails to deliver an open-source backdoor called […]
Chinese Hackers Murky, Genesis, and Glacial Panda Escalate Cloud and Telecom Espionage
Cybersecurity researchers are calling attention to malicious activity orchestrated by a China-nexus cyber espionage group known as Murky Panda that […]
INTERPOL Arrests 1,209 Cybercriminals Across 18 African Nations in Global Crackdown
Aug 22, 2025Ravie LakshmananOnline Fraud / Financial Crime INTERPOL on Friday announced that authorities from 18 countries across Africa have […]
Automation Is Redefining Pentest Delivery
Aug 22, 2025The Hacker NewsPenetration Testing / Security Operations Pentesting remains one of the most effective ways to identify real-world […]
Google releases Password Manager app
Whether you have been waiting for it or not, Google Password Manager is now available as a standalone app for […]
Ex-Developer Jailed Four Years for Sabotaging Ohio Employer with Kill-Switch Malware
Aug 22, 2025Ravie LakshmananCybercrime / Malware A 55-year-old Chinese national has been sentenced to four years in prison and three […]
Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks
Aug 21, 2025Ravie LakshmananVulnerability / Software Security Commvault has released updates to address four security gaps that could be exploited […]
Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages
Aug 21, 2025Ravie LakshmananMalware / Cryptocurrency Threat actors have been observed leveraging the deceptive social engineering tactic known as ClickFix […]
Weak Passwords and Compromised Accounts: Key Findings from the Blue Report 2025
As security professionals, it’s easy to get caught up in a race to counter the latest advanced adversary techniques. Yet […]