Technology

Hackers deploy stealth backdoors to WordPress Mu-Plugins to maintain administrator access

Cybersecurity researchers discover new stealth backdoors hidden within the "Mu-Plugins" directory of…

3 Min Read

Storm-2603 exploits a flaw in SharePoint to deploy Warlock ransomware on unearned systems

Microsoft revealed that one of the threat actors behind the aggressive exploitation…

7 Min Read

China-based APTS will deploy fake Dalai Lama apps to spy on Tibetan communities

The Tibetan community was targeted by Chinese and Nexus cyberspy groups as…

3 Min Read

Do you have a pen test once a year? no. It’s time to build offensive SOCs

You won't run your blue team once a year, so why accept…

10 Min Read

Watch this webinar to reveal hidden flaws in login, AI, and digital trusts and fix them

Is managing customer logins and data a headache? You are not alone!…

3 Min Read

Overcoming the risks from using Chinese genai tools

Recent analysis of enterprise data suggests that generation AI tools developed in…

4 Min Read

SOCO404 and Koske malware target cloud services with cross-platform encryption attacks

Threat Hunter offers cryptocurrency miners by disclosing two different malware campaigns targeting…

5 Min Read

Cyberspy Campaign hits Russian aerospace sector using Eaglet Backdoor

The Russian aerospace and defense industry has been targeted by a cyberspy…

3 Min Read

Patchwork targets Turkish defense companies with spear phishing using malicious LNK files

A threat actor known as Patchwork This is attributed to a new…

4 Min Read