Hackers deploy stealth backdoors to WordPress Mu-Plugins to maintain administrator access
Cybersecurity researchers discover new stealth backdoors hidden within the "Mu-Plugins" directory of…
3 Min Read
Storm-2603 exploits a flaw in SharePoint to deploy Warlock ransomware on unearned systems
Microsoft revealed that one of the threat actors behind the aggressive exploitation…
7 Min Read
China-based APTS will deploy fake Dalai Lama apps to spy on Tibetan communities
The Tibetan community was targeted by Chinese and Nexus cyberspy groups as…
3 Min Read
Do you have a pen test once a year? no. It’s time to build offensive SOCs
You won't run your blue team once a year, so why accept…
10 Min Read
Watch this webinar to reveal hidden flaws in login, AI, and digital trusts and fix them
Is managing customer logins and data a headache? You are not alone!…
3 Min Read
Overcoming the risks from using Chinese genai tools
Recent analysis of enterprise data suggests that generation AI tools developed in…
4 Min Read
SOCO404 and Koske malware target cloud services with cross-platform encryption attacks
Threat Hunter offers cryptocurrency miners by disclosing two different malware campaigns targeting…
5 Min Read
Cyberspy Campaign hits Russian aerospace sector using Eaglet Backdoor
The Russian aerospace and defense industry has been targeted by a cyberspy…
3 Min Read
Patchwork targets Turkish defense companies with spear phishing using malicious LNK files
A threat actor known as Patchwork This is attributed to a new…
4 Min Read