CYBERSECURITY 28
- The strange tale of ischhfd83 When cybercriminals eat their own
- The Bitter End Unraveling Eight Years of Espionage Antics—Part One
- StormWall Reveals India, China and US Faced Most DDoS Attacks in Q1 2025
- From open-source to open threat Tracking Chaos RAT’s evolution
- Criminals Bribed Outsourced Contractors to Steal Coinbase User Data
- Android malware trends Stealthier, easier-to-use
- The Hidden Cost of Trust New Data Reveals Alarming Employee Engagement with Vendor Email Compromise
- How Threat Actors Exploit Human Trust A Breakdown of the 'Prove You Are Human' Malware Scheme
- Victims risk AsyncRAT infection after being redirected to fake Booking.com sites
- Malicious Ruby Gems Exfiltrate Telegram Tokens and Messages Following Vietnam Ban
- Backdoors in Python and NPM Packages Target Windows and Linux
- Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown
- Interlock ransomware what you need to know
- Monkey-Patched PyPI Packages Use Transitive Dependencies to Steal Solana Private Keys
- Haozi’s Plug-and-Play Phishing-as-a-Service Has Facilitated $280,000 of Criminal Transactions Over Past Five Months
- Cybercriminals camouflaging threats as AI tool installers
- Zanubis in motion Tracing the active evolution of the Android banking malware
- Pakistan Telecommunication Company (PTCL) Targeted by Bitter APT During Heightened Regional Conflict
- Text-to-Malware How Cybercriminals Weaponize Fake AI-Themed Websites
- New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
- Malware or LLM? Silent Werewolf employs new loaders to attack Russian and Moldovan organizations
- Employees Searching Payroll Portals on Google Tricked Into Sending Paychecks to Hackers
- Earth Lamia Develops Custom Arsenal to Target Multiple Industries
- AIVD and MIVD identify new Russian cyber threat actor
- SilverRAT Source Code Leaked Online Here’s What You Need to Know
- Reborn in Rust AsyncRAT
- Eye of the Storm Dissecting the Playbook of Cyber Toufan
- Operation Sindoor – Anatomy of a Digital Siege