A cybercriminal group known as Tsar0Byte has allegedly claimed responsibility for breaching Nokia's internal network systems, potentially exposing sensitive data belonging to more than 94,500 employees.
The incident, reported across various dark web forums including DarkForums, represents one of the most significant alleged data...
Cybersecurity researchers have identified a sophisticated malware campaign utilizing malicious Windows shortcut (LNK) files to deliver the REMCOS backdoor, demonstrating how threat actors continue to evolve their tactics to bypass security measures.
The attack, identified through analysis of the file "ORDINE-DI-ACQUIST-7263535" (SHA256: 506ecb76cf8e39743ec06129d81873f0e4c1ebfe7a352fc5874d0fc60cc1d7c6), showcases...
WithSecure Detection and Response Team researchers have published a new technical analysis of the Lumma information stealer, revealing the malware's sophisticated multi-stage infection chain and its resilience following primary international law enforcement operations in 2025.
Persistent Threat Despite Law Enforcement Action
The analysis comes as Lumma...
A financially motivated threat actor known as "Lionishackers" has emerged as a significant player in the corporate database theft market, actively exfiltrating and selling sensitive company information through underground forums and encrypted messaging platforms.
According to recent threat intelligence analysis by Outpost24's KrakenLabs team,...
Cybercriminals are intensifying their efforts to exploit Formula 1 enthusiasts and racing teams ahead of the 2025 Belgian Grand Prix at Spa-Francorchamps on July 27.
Security experts warn that the high-profile event has become a prime target for sophisticated phishing campaigns and cyberattacks, with...
Security researchers from FortiGuard have uncovered a sophisticated web shell script, "UpdateChecker.aspx," that grants attackers comprehensive remote control over compromised Microsoft IIS servers.
The discovery is part of an ongoing investigation into cyber intrusions targeting critical national infrastructure in the Middle East.
Advanced Obfuscation Techniques...