Threats
Coverage of cybersecurity threats, threat actors, APT groups, malware campaigns, and emerging security risks. Includes analysis of threat intelligence, attack trends, and security advisories.
Popular
JDownloader Compromised: Malicious Windows & Linux
Malicious JPEG Images Exploit PHP Memory Safety Could Trigger
Critical Linux Kernel Flaw: Read SSH Keys & Passwords
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
Within less than a year, Gunra ransomware has rapidly evolved...
Shai-Hulud Worm Steals Developer Secrets from GitHub Kubernetes
Shai-Hulud, a newly discovered and dangerous malware, has...
Hackers Abuse OAuth Flow to Steal Microsoft Device Authorization
Attackers are abusing a lesser-known element within...
OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest
For years, the stealthy OrBit rootkit has quietly targeted Linux...
Microsoft Warns: Attackers Use HPE Agent for Malware-
Microsoft has issued a warning concerning a sophisticated attack...
Tycoon 2FA Operators Use OAuth Phishing to Bypass Adopt Device
Operators of the Tycoon 2FA phishing kit have integrated a...
TeamPCP Hackers Steal Cloud & Developer Credentials via
The TeamPCP hacking group has been observed actively abusing...
Microsoft Exposes Kazuar Malware’s Modular P Details Malware’s
Kazuar, a nation-state malware, has resurfaced. Its design now...
Hackers Abuse Scheduled Tasks for FrostyNeighbor Persistence
The state-aligned hacking group FrostyNeighbor has initiated a...
Chinese APT Exploits Microsoft Exchange to Breach Energy Networks
Chinese state-linked hacking group FamousSparrow has...


