North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels
Nov 14, 2025Ravie LakshmananMalware / Threat Intelligence The North Korean threat actors behind the Contagious Interview campaign have once again...
Nov 14, 2025Ravie LakshmananMalware / Threat Intelligence The North Korean threat actors behind the Contagious Interview campaign have once again...
Nov 14, 2025Ravie LakshmananThreat Intelligence / Vulnerability Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in Fortinet...
Nov 13, 2025Ravie LakshmananBrowser Security / Threat Intelligence Cybersecurity researchers have uncovered a malicious Chrome extension that poses as a...
Nov 13, 2025Ravie LakshmananBotnet / Cybercrime Malware families like Rhadamanthys Stealer, Venom RAT, and the Elysium botnet have been disrupted...
Nov 13, 2025Ravie LakshmananCybersecurity / Hacking News Behind every click, there's a risk waiting to be tested. A simple ad,...
Nov 13, 2025Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical...
Nov 12, 2025Ravie LakshmananCybercrime / Malware Google has filed a civil lawsuit in the U.S. District Court for the Southern...
Nov 12, 2025Ravie LakshmananNetwork Security / Zero-Day Amazon's threat intelligence team on Wednesday disclosed that it observed an advanced threat...
Nov 12, 2025The Hacker NewsThreat Detection / Risk Management Every day, security teams face the same problem—too many risks, too...
Nov 12, 2025Ravie LakshmananVulnerability / Patch Tuesday Microsoft on Tuesday released patches for 63 new security vulnerabilities identified in its...
Nov 12, 2025Ravie LakshmananArtificial Intelligence / Encryption Google on Tuesday unveiled a new privacy-enhancing technology called Private AI Compute to...
Nov 11, 2025Ravie LakshmananMalware / Network Security The malware known as GootLoader has resurfaced yet again after a brief spike...
Nov 11, 2025Ravie LakshmananSoftware Supply Chain / Malware Cybersecurity researchers have discovered a malicious npm package named "@acitons/artifact" that typosquats...
Nov 10, 2025Ravie LakshmananVulnerability / Incident Response Google's Mandiant Threat Defense on Monday said it discovered n-day exploitation of a...
Nov 10, 2025Ravie LakshmananMalware / Threat Intelligence Cybersecurity researchers have disclosed a new set of three extensions associated with the...