Threats

CISA and NSA Alert Organizations To BRICKSTORM Malware Targeting VMware ESXi and Windows Systems

CISA, NSA, and the Canadian Centre for Cyber Security released a joint Malware Analysis Report on December 4, 2025, warning…

5 months ago

Hackers Shift To “Living Off The Land” Tactics To Evade Windows EDR Systems

Cybercriminals increasingly use "Living Off the Land" (LOTL) techniques to bypass Windows Endpoint Detection and Response (EDR) systems. These methods…

5 months ago

Massive OAST Exploit Unleashes Attacks Across 200 CVEs Using Google Cloud Infrastructure

Security researchers at VulnCheck have uncovered a sophisticated exploit campaign leveraging a private out-of-band application security testing (OAST) service hosted…

5 months ago

NSA Releases Security Recommendations For Internet Providers and Network Defense Teams

The National Security Agency (NSA), along with the Cybersecurity and Infrastructure Security Agency (CISA) and several international partners, released a…

5 months ago

Unveiling the Tactics – How Researchers Expose North Korean Cyber Threats and Their Methods of Illicit Access

Cybersecurity researchers have unveiled sophisticated tactics employed by North Korean operatives who pose as legitimate remote workers to infiltrate organizations…

9 months ago

Leveraging LLM Honeypots – How Threat Actors Can Be Lured into Exposing Binaries and Exploits

Cybersecurity researchers have successfully demonstrated how Large Language Model (LLM)-powered honeypots can effectively deceive threat actors into revealing their attack…

9 months ago

New REMCOS Variant Leverages LNK Files to Evade Antivirus Detection and Empower Threat Actors

Cybersecurity researchers have identified a sophisticated malware campaign utilizing malicious Windows shortcut (LNK) files to deliver the REMCOS backdoor, demonstrating…

9 months ago

Raven Stealer Malware – How a Telegram-based Threat Pilfers Login Details, Payment Info, and Autofill Data

In a rapidly evolving cybercrime landscape, a new information-stealing malware dubbed Raven Stealer has emerged, directly targeting Windows users and leveraging Telegram for real-time…

9 months ago

Developer Accounts Under Attack – How Threat Actors Are Exploiting Prettier Tooling Packages

The Node.js ecosystem faced a critical supply chain attack this week as several popular npm packages, including eslint-config-prettier and eslint-plugin-prettier were compromised through…

9 months ago

SVF Botnet Infects Linux SSH Servers in Ongoing Threat Actor Attacks

Cybersecurity researchers at AhnLab Security Intelligence Center (ASEC) have identified a sophisticated campaign targeting poorly secured Linux servers through SSH…

9 months ago