Storm-1977 uses Azurechecker to hit the education cloud and deploy over 200 crypto mining vessels
Microsoft has revealed that Storm-1977 has been carrying out password spray attacks…
How Google’s AI unlocks the secrets of dolphin communication
Dolphins are known for their intelligence, complex social behavior and complex communication…
Darcula adds Genai to its phishing toolkit, lowering barriers for cybercriminals
The threat actors behind the Darcula Phishing-as-a-Service (PHAAS) platform have released a…
DSLOGDRAT malware deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan’s attack
Cybersecurity researchers have warned about a new malware called Dslogdrat, which is…
Toymaker uses Lagtoy to sell access to Cactus ransomware gangs for double horror
Cybersecurity researchers detail the activities of early access brokers (IABs) Toymaker It…
Researchers identify static vulnerabilities that allow data breach in rack:: Ruby servers
Cybersecurity researchers have disclosed three security flaws in the Rack Ruby Web…
Why NHIS is the most dangerous blind spot in security
When talking about cybersecurity identity, most people think about usernames, passwords, and…
North Korean hacker spreads malware via fake crypto companies and employment interview lures
The North Korea-related threat actors behind the infectious interviews have set up…
Self-recognized images with simple JPEG compression
Concerns about the risks posed by tampered images have been regularly exhibited…