IoT Exploits, Wallet Breaches, Rogue Extensions, AI Abuse & More

Jan 05, 2026Ravie LakshmananHacking News / Cybersecurity The year opened without a reset. The same pressure…

The State of Cybersecurity in 2025: Key Segments, Insights, and Innovations 

Jan 05, 2026The Hacker NewsData Protection / Artificial Intelligence Featuring: Cybersecurity is being reshaped by forces…

Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act

Jan 05, 2026Ravie LakshmananCryptocurrency / Financial Crime Ilya Lichtenstein, who was sentenced to prison last year…

New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code

Jan 05, 2026Ravie LakshmananThreat Intelligence / Windows Security Cybersecurity researchers have disclosed details of a new…

Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia

The threat actor known as Transparent Tribe has been attributed to a fresh set of attacks…

The ROI Problem in Attack Surface Management

Attack Surface Management (ASM) tools promise reduced risk. What they usually deliver is more information. Security…

Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign

Jan 02, 2026Ravie LakshmananCloud Security / Email Security Cybersecurity researchers have disclosed details of a phishing…

How To Browse Faster and Get More Done Using Adapt Browser

As web browsers evolve into all-purpose platforms, performance and productivity often suffer. Feature overload, excessive background…

GhostAd Drain, macOS Attacks, Proxy Botnets, Cloud Exploits, and 12+ Stories

Jan 01, 2026Ravie LakshmananCybersecurity / Hacking News The first ThreatsDay Bulletin of 2026 lands on a…

RondoDox Botnet Exploits Critical React2Shell Flaw to Hijack IoT Devices and Web Servers

Jan 01, 2026Ravie LakshmananNetwork Security / Vulnerability Cybersecurity researchers have disclosed details of a persistent nine-month-long…