UAT-10362 spear-phishing targets Taiwanese NGOs in October 2025, deploying LucidRook malware for data exfiltration and ...
STX RAT, a newly identified remote access trojan, attempted deployment in finance, showing advanced C2 and stealthy delivery ...
This week, German police unmasked a REvil leader, a critical Docker flaw, Medusa ransomware surged, DPRK hackers abused ...
Augmented Marauder targets Latin America and Europe since 2020, using dynamic PDF phishing to spread Casbaneiro via Horabot.
The Medusa ransomware group is operating at a fast pace by leveraging zero-days and quickly exploiting new bugs and breached ...
The financially motivated cybercriminal threat actor Storm-1175 operates high-velocity ransomware campaigns that weaponize ...
Windows can now behave like a Linux machine.
A sophisticated cyber espionage campaign has breached military systems across Southeast Asia. The operation, tracked as CL-STA-1087, has reportedly been active since at least 2020. It has quietly ...
Use semantic versioning (X.Y.Z) so version numbers are meaningful, not arbitrary. Patch updates should fix bugs or improve logic/performance without changing visible behavior. Minor and major updates ...
You can wrap an executable file around a PowerShell script (PS1) so that you can distribute the script as an .exe file rather than distributing a “raw” script file. This eliminates the need to explain ...
With almost 175,000 npm projects listing the library as a dependency, the attack had a huge cascade effect and shows how ...