Tactics
- APPLICATIONS
Initial Access Brokers Shift Tactics, Selling More for Less
What are IABs? Initial Access Brokers (IABs) specialize in gaining unauthorized entry into computer systems and networks, then selling that…
Read More » - REVIEWS
“The girl should be calling men.” Leak exposes Black Basta’s influence tactics.
A leak of 190,000 chat messages traded among members of the Black Basta ransomware group shows that it’s a highly…
Read More » - APPLICATIONS
AI Threats Are Evolving Fast — Learn Practical Defense Tactics in this Expert Webinar
Apr 03, 2025The Hacker News The rules have changed. Again. Artificial intelligence is bringing powerful new tools to businesses. But…
Read More » - APPLICATIONS
Chrome 0-Day, IngressNightmare, Solar Bugs, DNS Tactics, and More
Mar 31, 2025Ravie LakshmananThreat Intelligence / Cybersecurity Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting,…
Read More » - APPLICATIONS
3 Victims, $5K Entry Fee, Multi-OS, and Double Extortion Tactics
Mar 24, 2025Ravie LakshmananMalware / Ransomware A ransomware-as-a-service (RaaS) operation called VanHelsing has already claimed three victims since it launched…
Read More » - APPLICATIONS
GitHub Supply Chain Attack, AI Malware, BYOVD Tactics, and More
Mar 24, 2025Ravie LakshmananWeekly Recap / Hacking A quiet tweak in a popular open-source tool opened the door to a…
Read More » - GAMING
New Star Wars Turn-Based Tactics Game to Be Revealed at Star Wars Celebration 2025
EA’s Star Wars turn-based tactics game will be revealed at Star Wars Celebration 2025. The untitled Star Wars strategy game…
Read More » - APPLICATIONS
Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates
Mar 04, 2025Ravie LakshmananCybercrime / Threat Intelligence Threat actors deploying the Black Basta and CACTUS ransomware families have been found…
Read More » - APPLICATIONS
Debunking the AI Hype: Inside Real Hacker Tactics
Feb 18, 2025The Hacker NewsArtificial Intelligence / Cyber Defense Is AI really reshaping the cyber threat landscape, or is the…
Read More »