Hackers continuously exploit malicious Python packages to attack developer environments and inject harmful code that enables them to steal sensitive…
Onyx Sleet, a cyber espionage group also known as SILENT CHOLLIMA, Andariel, DarkSeoul, Stonefly, and TDrop2, mainly targets the military,…
A rudimentary ransomware targets Turkish businesses through phishing emails with ".ru" domain sender addresses. Clicking a PDF attachment's link triggers…
Shared frameworks are often prone to hackers' abuses as they have been built into various applications, which offer a range…
Hackers often register new domains for phishing attacks, spreading malware, and other deceitful activities. Such domains are capable of pretending…
SocGholish malware, also known as FakeUpdates, has exhibited new behavior since July 4th, 2024, as the infection chain still begins…
Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which link to a variety of systems…
Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and often have extensive community support, making…
Meeting apps are often targeted and turned into weapons by hackers as they are largely employed for communication and collaboration,…
Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has escalated its phishing campaigns in Middle…