Jan 05, 2026Ravie LakshmananHacking News / Cybersecurity The year opened without a reset. The same pressure…
Technology
The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations
Jan 05, 2026The Hacker NewsData Protection / Artificial Intelligence Featuring: Cybersecurity is being reshaped by forces…
Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act
Jan 05, 2026Ravie LakshmananCryptocurrency / Financial Crime Ilya Lichtenstein, who was sentenced to prison last year…
New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code
Jan 05, 2026Ravie LakshmananThreat Intelligence / Windows Security Cybersecurity researchers have disclosed details of a new…
Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia
The threat actor known as Transparent Tribe has been attributed to a fresh set of attacks…
The ROI Problem in Attack Surface Management
Attack Surface Management (ASM) tools promise reduced risk. What they usually deliver is more information. Security…
Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign
Jan 02, 2026Ravie LakshmananCloud Security / Email Security Cybersecurity researchers have disclosed details of a phishing…
How To Browse Faster and Get More Done Using Adapt Browser
As web browsers evolve into all-purpose platforms, performance and productivity often suffer. Feature overload, excessive background…
GhostAd Drain, macOS Attacks, Proxy Botnets, Cloud Exploits, and 12+ Stories
Jan 01, 2026Ravie LakshmananCybersecurity / Hacking News The first ThreatsDay Bulletin of 2026 lands on a…
RondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers
Jan 01, 2026Ravie LakshmananNetwork Security / Vulnerability Cybersecurity researchers have disclosed details of a persistent nine-month-long…