Cyber News

Russian Hackers Exploit Email and VPN Vulnerabilities t...

Russian cyber threat actors have been attributed to a state-sponsored campaign t...

PureRAT Malware Spikes 4x in 2025, Deploying PureLogs t...

Russian organizations have become the target of a phishing campaign that distrib...

Fake Kling AI Facebook Ads Deliver RAT Malware to Over ...

Counterfeit Facebook pages and sponsored ads on the social media platform are be...

Securing CI/CD workflows with Wazuh

Continuous Integration and Continuous Delivery/Deployment (CI/CD) refers to prac...

How to Detect Phishing Attacks Faster: Tycoon2FA Example

It takes just one email to compromise an entire system. A single well-crafted me...

Researchers Expose PWA JavaScript Attack That Redirects...

Cybersecurity researchers have discovered a new campaign that employs malicious ...

Google Chrome Can Now Auto-Change Compromised Passwords...

Google has announced a new feature in its Chrome browser that lets its built-in ...

The who, where, and how of APT attacks in Q4 2024–Q1 2025

ESET Chief Security Evangelist Tony Anscombe highlights key findings from the la...

ESET APT Activity Report Q4 2024–Q1 2025

An overview of the activities of selected APT groups investigated and analyzed b...

100+ Fake Chrome Extensions Found Hijacking Sessions, S...

An unknown threat actor has been attributed to creating several malicious Chrome...

AWS Default IAM Roles Found to Enable Lateral Movement ...

Cybersecurity researchers have discovered risky default identity and access mana...

South Asian Ministries Hit by SideWinder APT Using Old ...

High-level government institutions in Sri Lanka, Bangladesh, and Pakistan have e...

Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate...

A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud re...

Go-Based Malware Deploys XMRig Miner on Linux Hosts via...

Cybersecurity researchers are calling attention to a new Linux cryptojacking cam...

Malicious PyPI Packages Exploit Instagram and TikTok AP...

Cybersecurity researchers have uncovered malicious packages uploaded to the Pyth...

The Crowded Battle: Key Insights from the 2025 State of...

In the newly released 2025 State of Pentesting Report, Pentera surveyed 500 CISO...