Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like…
Technology
Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware
Oct 02, 2025Ravie LakshmananRansomware / Threat Intelligence Google Mandiant and Google Threat Intelligence Group (GTIG) have…
CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More
Oct 02, 2025Ravie LakshmananThreat Intelligence / Cyber Attacks From unpatched cars to hijacked clouds, this week’s…
Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware
Oct 02, 2025Ravie LakshmananMalware / Cyber Espionage The threat actor known as Confucius has been attributed…
Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown
Oct 02, 2025Ravie LakshmananPython / Malware Cybersecurity researchers have flagged a malicious package on the Python…
7 Key Workflows for Maximum Impact
Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and…
How to Close Threat Detection Gaps: Your SOC’s Action Plan
Running a SOC often feels like drowning in alerts. Every morning, dashboards light up with thousands…
Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising
Oct 01, 2025The Hacker NewsAttack Surface / Artificial Intelligence Bitdefender’s 2025 Cybersecurity Assessment Report paints a…
Hackers Exploit Milesight Routers to Send Phishing SMS to European Users
Oct 01, 2025Ravie LakshmananVulnerability / Malware Unknown threat actors are abusing Milesight industrial cellular routers to…
New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer
Oct 01, 2025Ravie LakshmananEncryption / Hardware Security In yet another piece of research, academics from Georgia…