Bloody Wolf Expands Java-based NetSupport RAT Attacks in Kyrgyzstan and Uzbekistan
Nov 27, 2025Ravie LakshmananMalware / Social Engineering The threat actor known as Bloody Wolf has been attributed to a cyber...
Nov 27, 2025Ravie LakshmananMalware / Social Engineering The threat actor known as Bloody Wolf has been attributed to a cyber...
Tel Aviv, Israel, November 27th, 2025, CyberNewsWire New API capabilities and AI-powered Threat Encyclopedia eliminate manual audit preparation, providing...
Image generated by Google’s Nano Banana A new discovery from Gen Threat Labs indicates that Russia’s Gamaredon and North Korea’s...
Nov 26, 2025Ravie LakshmananMalware / Cyber Espionage The threat actors behind a malware family known as RomCom targeted a U.S.-based...
Nov 25, 2025Ravie LakshmananMalware / Vulnerability The threat actor known as ToddyCat has been observed adopting new methods to obtain...
2026 will mark a pivotal shift in cybersecurity. Threat actors are moving from experimenting with AI to making it their...
Countering the Digital Threat – NATO 2025 I am incredibly honored and proud to announce that I have been formally...
Nov 22, 2025Ravie LakshmananCyber Espionage / Cloud Security The China-linked advanced persistent threat (APT) group known as APT31 has been...
Nov 21, 2025Ravie LakshmananVulnerability / Threat Mitigation Grafana has released security updates to address a maximum severity security flaw that...
A China-nexus threat actor known as APT24 has been observed using a previously undocumented malware dubbed BADAUDIO to establish persistent...
Nov 20, 2025Ravie LakshmananCyber Warfare / Threat Intelligence Threat actors with ties to Iran engaged in cyber warfare as part...
Nov 19, 2025Ravie LakshmananVulnerability / Threat Intelligence A recently disclosed security flaw impacting 7-Zip has come under active exploitation in...
Nov 19, 2025Ravie LakshmananVulnerability / Threat Intelligence A newly discovered campaign has compromised tens of thousands of outdated or end-of-life...
Nov 19, 2025Ravie LakshmananCyber Espionage / MalwareThe threat actor known as PlushDaemon has been observed using a previously undocumented Go-based...
Cybersecurity researchers have discovered a set of seven npm packages published by a single threat actor that leverages a cloaking...