APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign

Oct 24, 2025Ravie LakshmananCyber Espionage / Malware A Pakistan-nexus threat actor has been observed targeting Indian…

Why Executives and Practitioners See Risk Differently

Oct 24, 2025The Hacker NewsCyber Resilience / Data Protection Does your organization suffer from a cybersecurity…

3,000 YouTube Videos Exposed as Malware Traps in Massive Ghost Network Operation

Oct 24, 2025Ravie LakshmananMalware / Hacking News A malicious network of YouTube accounts has been observed…

Self-Spreading ‘GlassWorm’ Infects VS Code Extensions in Widespread Supply Chain Attack

Oct 24, 2025Ravie LakshmananDevOps / Malware Cybersecurity researchers have discovered a self-propagating worm that spreads via…

Critical Lanscope Endpoint Manager Bug Exploited in Ongoing Cyberattacks, CISA Confirms

Oct 23, 2025Ravie LakshmananVulnerability / Threat Intelligence The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on…

North Korean Hackers Lure Defense Engineers With Fake Jobs to Steal Drone Secrets

Oct 23, 2025Ravie LakshmananCyber Espionage / Threat Intelligence Threat actors with ties to North Korea have…

$176M Crypto Fine, Hacking Formula 1, Chromium Vulns, AI Hijack & More

Oct 23, 2025Ravie LakshmananCybersecurity / Hacking News Criminals don’t need to be clever all the time;…

Secure AI at Scale and Speed — Learn the Framework in this Free Webinar

Oct 23, 2025The Hacker NewsArtificial Intelligence / Data Protection AI is everywhere—and your company wants in.…

Why Organizations Are Abandoning Static Secrets for Managed Identities

Oct 23, 2025The Hacker NewsDevOps / Data Protection As machine identities explode across cloud environments, enterprises…

“Jingle Thief” Hackers Exploit Cloud Infrastructure to Steal Millions in Gift Cards

Cybersecurity researchers have shed light on a cybercriminal group called Jingle Thief that has been observed…