GOLD SALEM tradecraft for deploying Warlock ransomware
In mid-August 2025, Counter Threat Unit™ (CTU) researchers identified the use of the legitimate Velociraptor digital forensics and incident response...
In mid-August 2025, Counter Threat Unit™ (CTU) researchers identified the use of the legitimate Velociraptor digital forensics and incident response...
Image: Adobe Stock A newly identified China-nexus cyber adversary, tracked by CrowdStrike as WARP PANDA, has emerged as one of...
ESET researchers have identified new MuddyWater activity primarily targeting organizations in Israel, with one confirmed target in Egypt. MuddyWater, also...
Nov 20, 2025The Hacker NewsOnline Fraud / Web Security CTM360 has identified a rapidly expanding WhatsApp account-hacking campaign targeting users...
From Detection to Resolution: Why the Gap Persists A critical vulnerability is identified in an exposed cloud asset. Within hours,...
Oct 14, 2025Ravie LakshmananMalware / Typosquatting Cybersecurity researchers have identified several malicious packages across npm, Python, and Ruby ecosystems that...
ESET researchers have identified a new threat actor, whom we have named GhostRedirector, that compromised at least 65 Windows servers...
LOCKBIT 3.0 is a well-known Ransomware Group that was initially recognized on December 9, 2022. Operating under different aliases and...
Research Trends have detected various IP address ranges in Russia employed for cyber criminality in collaboration with North Korea. These...
Summary of the PlayPraetor Disguised Party Versions CTM360 has uncovered a significantly wider scope of the continuous Play Praetor initiative....
Four various malicious entities have been recognized as participating in a revised iteration of an extensive ad deception and residential...
Several threat agencies have been acknowledged as participants in an enhanced variation of a substantial ad exploitation and residential proxy...
Security experts have discovered three groups of harmful packages within the npm and Python Package Index (PyPI) archive that possess...
Information security analysts have uncovered connections in infrastructure between the North Korean cybercriminals involved in the deceptive computer specialist ploys...
McAfee threat researchers have identified several consumer brands and product categories most frequently used by cybercriminals to trick consumers into...