The Blind Spot Fueling Payment Skimmer Attacks

Think payment iframes are secure by design? Think again. Sophisticated attackers have quietly evolved malicious overlay…

New YiBackdoor Malware Shares Major Code Overlaps with IcedID and Latrodectus

Sep 24, 2025Ravie LakshmananMalware / Windows Security Cybersecurity researchers have disclosed details of a new malware…

Two Critical Flaws Uncovered in Wondershare RepairIt Exposing User Data and AI Models

Cybersecurity researchers have disclosed two security flaws in Wondershare RepairIt that exposed private user data and…

Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike

Sep 24, 2025Ravie LakshmananVulnerability / Network Security A suspected cyber espionage activity cluster that was previously…

UNC5221 Uses BRICKSTORM Backdoor to Infiltrate U.S. Legal and Technology Sectors

Companies in the legal services, software-as-a-service (SaaS) providers, Business Process Outsourcers (BPOs), and technology sectors in…

How One Bad Password Ended a 158-Year-Old Business

Most businesses don’t make it past their fifth birthday – studies show that roughly 50% of…

State-Sponsored Hackers Exploiting Libraesva Email Security Gateway Vulnerability

Sep 24, 2025Ravie LakshmananVulnerability / Email Security Libraesva has released a security update to address a…

Hackers Exploit Pandoc CVE-2025-51591 to Target AWS IMDS and Steal EC2 IAM Credentials

Cloud security company Wiz has revealed that it uncovered in-the-wild exploitation of a security flaw in…

ShadowV2 Botnet Exploits Misconfigured AWS Docker Containers for DDoS-for-Hire Service

Cybersecurity researchers have disclosed details of a new botnet that customers can rent access to conduct…

Eurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries

Sep 23, 2025Ravie LakshmananFinancial Crime / Cryptocurrency Law enforcement authorities in Europe have arrested five suspects…