hackers
- APPLICATIONS
Hackers Use Fake VPN and Browser NSIS Installers to Deliver Winos 4.0 Malware
May 25, 2025Ravie LakshmananThreat Intelligence / Software Security Cybersecurity researchers have disclosed a malware campaign that uses fake software installers…
Read More » - APPLICATIONS
Hackers Use TikTok Videos to Distribute Vidar and StealC Malware via ClickFix Technique
The malware known as Latrodectus has become the latest to embrace the widely-used social engineering technique called ClickFix as a…
Read More » - APPLICATIONS
Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks
May 22, 2025Ravie LakshmananVulnerability / Threat Intelligence A Chinese-speaking threat actor tracked as UAT-6382 has been linked to the exploitation…
Read More » - APPLICATIONS
Chinese Hackers Exploit Ivanti EPMM Bugs in Global Enterprise Network Attacks
May 22, 2025Ravie LakshmananEnterprise Security / Malware A recently patched pair of security flaws affecting Ivanti Endpoint Manager Mobile (EPMM)…
Read More » - APPLICATIONS
Russian Hackers Exploit Email and VPN Vulnerabilities to Spy on Ukraine Aid Logistics
Russian cyber threat actors have been attributed to a state-sponsored campaign targeting Western logistics entities and technology companies since 2022.…
Read More » - APPLICATIONS
Chinese Hackers Deploy MarsSnake Backdoor in Multi-Year Attack on Saudi Organization
May 20, 2025Ravie LakshmananMalware / Cyber Espionage Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker…
Read More » - REVIEWS
The UK says hackers breached its Legal Aid Agency to steal a “significant amount of personal data” from those who receive legal aid across England and Wales (Ryan Gallagher/Bloomberg)
Featured Podcasts Grit: From Scaling Cisco to Seeding AI: John T. Chambers on Speed, Strategy, and Reinvention Grit explores what…
Read More » - APPLICATIONS
Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers
May 13, 2025Ravie LakshmananZero-Day / Vulnerability A Türkiye-affiliated threat actor exploited a zero-day security flaw in an Indian enterprise communication…
Read More » - APPLICATIONS
Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
May 09, 2025Ravie LakshmananVulnerability / Industrial Security A China-linked unnamed threat actor dubbed Chaya_004 has been observed exploiting a recently…
Read More »