Technology

Storm-1977 uses Azurechecker to hit the education cloud and deploy over 200 crypto mining vessels

Microsoft has revealed that Storm-1977 has been carrying out password spray attacks…

2 Min Read

How Google’s AI unlocks the secrets of dolphin communication

Dolphins are known for their intelligence, complex social behavior and complex communication…

7 Min Read

Darcula adds Genai to its phishing toolkit, lowering barriers for cybercriminals

The threat actors behind the Darcula Phishing-as-a-Service (PHAAS) platform have released a…

3 Min Read

DSLOGDRAT malware deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan’s attack

Cybersecurity researchers have warned about a new malware called Dslogdrat, which is…

3 Min Read

Toymaker uses Lagtoy to sell access to Cactus ransomware gangs for double horror

Cybersecurity researchers detail the activities of early access brokers (IABs) Toymaker It…

3 Min Read

Researchers identify static vulnerabilities that allow data breach in rack:: Ruby servers

Cybersecurity researchers have disclosed three security flaws in the Rack Ruby Web…

5 Min Read

Why NHIS is the most dangerous blind spot in security

When talking about cybersecurity identity, most people think about usernames, passwords, and…

10 Min Read

North Korean hacker spreads malware via fake crypto companies and employment interview lures

The North Korea-related threat actors behind the infectious interviews have set up…

7 Min Read

Self-recognized images with simple JPEG compression

Concerns about the risks posed by tampered images have been regularly exhibited…

12 Min Read