News

Microsoft and Europol dismantled Lumma’s 2,300-domain C2 network after 10M infections tied to credential and crypto theft.
APT28 targets NATO-aligned logistics and tech firms via malware, phishing, and 7 CVEs to spy on Ukraine aid routes.
The original executable that launches "ckcfb.exe" simultaneously also extracts a second binary referred to as "StilKrip.exe," ...
Fake Facebook ads impersonating Kling AI deploy PureHVNC RAT via spoofed sites, stealing credentials and crypto data.
A sandbox is an isolated virtual machine where you can safely open files, click links, and observe behavior without putting ...
Malicious JavaScript redirects mobile users to fake adult PWA apps, bypassing browser security and desktop filters.
Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker that targeted an unnamed ...
Google has launched a new Chrome feature that automatically updates compromised passwords using its built-in Password Manager ...
A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud resources of high-profile organizations, ...
The attack chains leverage spear-phishing lures as a starting point to activate the infection process and deploy a known ...
Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web ...
Discover findings from Pentera's 2025 State of Pentesting Report, including breach rates, alert fatigue, budget trends & the ...