Oyster Backdoor Disguised as PuTTY and KeyPass Targets IT Admins via SEO Poisoning
Threat actors have been using trojanized versions of well-known IT tools like PuTTY and WinSCP…
Threat actors have been using trojanized versions of well-known IT tools like PuTTY and WinSCP…
China’s Cyberspace Administration, Ministry of Public Security, and Ministry of Industry and Information Technology introduced…
Singapore’s critical infrastructure sectors, including energy, water, telecommunications, finance, and government services, are facing an…
Raven Stealer has emerged as sophisticated, lightweight information-stealing malware crafted in Delphi and C++, targeting…
Cybersecurity researchers have successfully deployed artificial intelligence-powered honeypots to trick cybercriminals into revealing their…
In 2025, the demand for sophisticated ethical hacking services has intensified, driven by the rapid…
The popular npm package ‘is’, which has about 2.8 million weekly downloads, has been taken…
Malware-as-a-service (MaaS) platforms like PhantomOS and Nebula are democratizing Android device attacks because they provide…
The Atomic macOS Stealer (AMOS), a notorious infostealer malware targeting Apple’s macOS ecosystem, has undergone…
Palo Alto Networks’ Unit 42, the cybercrime group tracked as Muddled Libra also known as…