Beware of Android Spyware Disguised as Signal Encryption Plugin and ToTok Pro

Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like…

Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware

Oct 02, 2025Ravie LakshmananRansomware / Threat Intelligence Google Mandiant and Google Threat Intelligence Group (GTIG) have…

CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More

Oct 02, 2025Ravie LakshmananThreat Intelligence / Cyber Attacks From unpatched cars to hijacked clouds, this week’s…

Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware

Oct 02, 2025Ravie LakshmananMalware / Cyber Espionage The threat actor known as Confucius has been attributed…

Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown

Oct 02, 2025Ravie LakshmananPython / Malware Cybersecurity researchers have flagged a malicious package on the Python…

7 Key Workflows for Maximum Impact

Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and…

How to Close Threat Detection Gaps: Your SOC’s Action Plan

Running a SOC often feels like drowning in alerts. Every morning, dashboards light up with thousands…

Breaches Hidden, Attack Surfaces Growing, and AI Misperceptions Rising

Oct 01, 2025The Hacker NewsAttack Surface / Artificial Intelligence Bitdefender’s 2025 Cybersecurity Assessment Report paints a…

Hackers Exploit Milesight Routers to Send Phishing SMS to European Users

Oct 01, 2025Ravie LakshmananVulnerability / Malware Unknown threat actors are abusing Milesight industrial cellular routers to…

New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer

Oct 01, 2025Ravie LakshmananEncryption / Hardware Security In yet another piece of research, academics from Georgia…