SLH Offers $500–$1,000 Per Call to Recruit Women for IT Help Desk Vishing Attacks
Ravie LakshmananFeb 25, 2026Social Engineering / Cloud Security The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been...
Ravie LakshmananFeb 25, 2026Social Engineering / Cloud Security The notorious cybercrime collective known as Scattered LAPSUS$ Hunters (SLH) has been...
U.S. CISA adds a flaw in Soliton Systems K.K FileZen to its Known Exploited Vulnerabilities catalog Pierluigi Paganini February 25,...
The threat activity cluster known as UnsolicitedBooker has been observed targeting telecommunications companies in Kyrgyzstan and Tajikistan, marking a shift...
Ravie LakshmananFeb 23, 2026Threat Intelligence / Artificial Intelligence The Iranian hacking group known as MuddyWater (aka Earth Vetala, Mango Sandstorm,...
For the past week, the massive “Internet of Things” (IoT) botnet known as Kimwolf has been disrupting The Invisible Internet...
U.S. CISA adds RoundCube Webmail flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini February 21, 2026 U.S. Cybersecurity and...
ESET researchers uncovered the first known case of Android malware abusing generative AI for context-aware user interface manipulation. While machine...
U.S. CISA adds Dell RecoverPoint and GitLab flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini February 19, 2026 U.S....
U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog Pierluigi Paganini February 14,...
Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in detected in the wild. In...
For the past week, the massive “Internet of Things” (IoT) botnet known as Kimwolf has been disrupting The Invisible...
U.S. CISA adds Microsoft Office and Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini February 11, 2026...
The North Korea-linked threat actor known as UNC1069 has been observed targeting the cryptocurrency sector to steal sensitive data from...
Ravie LakshmananFeb 09, 2026Threat Intelligence / Cyber Espionage The threat actor known as Bloody Wolf has been linked to a...
U.S. CISA adds SmarterTools SmarterMail and React Native Community CLI flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini February...