TA558 Uses AI-Generated Scripts to Deploy Venom RAT in Brazil Hotel Attacks
The threat actor known as TA558 has been attributed to a fresh set of attacks delivering various remote access trojans...
The threat actor known as TA558 has been attributed to a fresh set of attacks delivering various remote access trojans...
Sep 17, 2025Ravie LakshmananCyber Espionage / Malware A China-aligned threat actor known as TA415 has been attributed to spear-phishing campaigns...
Counter Threat Unit™ (CTU) researchers are monitoring a threat group that refers to itself as Warlock Group. The group, which...
A recent report from AI giant Anthropic outlined multiple instances where threat actors abused its Claude LLM in their nefarious...
The bad actors behind the Scattered Lapsus$ Hunters threat group say they are shutting down operations and retiring, but cybersecurity...
Sep 15, 2025Ravie LakshmananMalware / Network Security The China-aligned threat actor known as Mustang Panda has been observed using an...
Threat intelligence feeds come with a simple promise: Improve operational security by teaching security practitioners what Tactics, Techniques, and Procedures...
Sep 11, 2025The Hacker NewsContinuous Threat Exposure Management CISOs know their field. They understand the threat landscape. They understand how...
Threat actors affiliated with the Akira ransomware group have continued to target SonicWall devices for initial access. Cybersecurity firm Rapid7...
Sep 10, 2025Ravie LakshmananCybersecurity / Malware An advanced persistent threat (APT) group from China has been attributed to the compromise...
Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft's Direct Send feature to form a "highly...
Sep 09, 2025Ravie LakshmananMobile Security / Threat Intelligence A new Android malware called RatOn has evolved from a basic tool...
Sep 09, 2025The Hacker NewsArtificial Intelligence / Threat Detection ⚠️ One click is all it takes. An engineer spins up...
A threat actor possibly of Russian origin has been attributed to a new set of attacks targeting the energy sector...
Business Security As the attack surface expands and the threat landscape grows more complex, it’s time to consider whether your...