Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp

3 min read
admin
March 31, 2025
The threat actors behind the zero-day exploitation of a recently-patched security vulnerability in Microsoft Windows have been...
admin
March 31, 2025
Threat actors are using the "mu-plugins" directory in WordPress sites to conceal malicious code with the goal...
admin
March 31, 2025
Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or...
admin
March 31, 2025
If you're using AWS, it's easy to assume your cloud security is handled - but that's a...
admin
March 31, 2025
Entities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote...
admin
March 30, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE...
New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials

3 min read
admin
March 29, 2025
Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that's primarily designed to target users...
admin
March 29, 2025
In what's an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure...
admin
March 28, 2025
Cybersecurity researchers are calling attention to a new sophisticated malware called CoffeeLoader that's designed to download and...
admin
March 28, 2025
Cybersecurity researchers have disclosed 46 new security flaws in products from three solar inverter vendors, Sungrow, Growatt,...
admin
March 28, 2025
Mozilla has released updates to address a critical security flaw impacting its Firefox browser for Windows, merely...
admin
March 28, 2025
Long gone are the days when a simple backup in a data center was enough to keep...
admin
March 28, 2025
An Android malware family previously observed targeting Indian military personnel has been linked to a new campaign...
admin
March 28, 2025
Cybersecurity researchers have discovered several cryptocurrency packages on the npm registry that have been hijacked to siphon...
admin
March 27, 2025
Cybersecurity researchers have shed light on a new phishing-as-a-service (PhaaS) platform that leverages the Domain Name System...
admin
March 27, 2025
A new analysis has uncovered connections between affiliates of RansomHub and other ransomware groups like Medusa, BianLian,...
admin
March 27, 2025
An advanced persistent threat (APT) group with ties to Pakistan has been attributed to the creation of...
admin
March 27, 2025
Whether it’s CRMs, project management tools, payment processors, or lead management tools - your workforce is using...
admin
March 27, 2025
Hackers have long used Word and Excel documents as delivery vehicles for malware, and in 2025, these...
admin
March 27, 2025
An ongoing campaign that infiltrates legitimate websites with malicious JavaScript injects to promote Chinese-language gambling platforms has...