Transparent Tribe Uses AI to Mass-Produce Malware Implants in Campaign Targeting India
Ravie LakshmananMar 06, 2026Threat Intelligence / Cyber Espionage The Pakistan-aligned threat actor known as Transparent Tribe has become the latest...
Category Added in a WPeMatico Campaign
Ravie LakshmananMar 06, 2026Threat Intelligence / Cyber Espionage The Pakistan-aligned threat actor known as Transparent Tribe has become the latest...
Cybersecurity researchers have disclosed details of a multi-stage malware campaign that uses batch scripts as a pathway to deliver various...
The Hacker NewsMar 06, 2026Artificial Intelligence / Enterprise Security Scaling cybersecurity services as an MSP or MSSP requires technical expertise...
New research from Broadcom's Symantec and Carbon Black Threat Hunter Team has discovered evidence of an Iranian hacking group embedding...
Ravie LakshmananMar 06, 2026Cyber Espionage / Threat Intelligence A China-linked advanced persistent threat (APT) actor has been targeting critical telecommunications...
Ravie LakshmananMar 06, 2026Endpoint Security / Browser Security Microsoft on Thursday disclosed details of a new widespread ClickFix social engineering...
Ravie LakshmananMar 06, 2026Vulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security...
The Hacker NewsMar 05, 2026Encryption / Data Protection Most organizations assume encrypted data is safe. But many attackers are already...
Ravie LakshmananMar 05, 2026Vulnerability / Enterprise Security Cisco has disclosed that two more vulnerabilities affecting Catalyst SD-WAN Manager (formerly SD-WAN...
Ravie LakshmananMar 05, 2026Cybersecurity / Hacking News Some weeks in cybersecurity feel routine. This one doesn’t. Several new developments surfaced...
Ravie LakshmananMar 05, 2026Malware / Threat Intelligence A suspected Iran-nexus threat actor has been attributed to a campaign targeting government...
Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In Windows...
Ravie LakshmananMar 05, 2026Cyber Espionage / Threat Intelligence Cybersecurity researchers have disclosed details of a new Russian cyber campaign that...
Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that allowed cybercriminals to stage adversary-in-the-middle (AitM) credential harvesting attacks at...
Ravie LakshmananMar 05, 2026Malware / Dark Web A joint law enforcement operation has dismantled LeakBase, one of the world's largest...