The Bloody Wolf cyber campaign has expanded into one of the most active and regionally focused intrusion operations in Central Asia. New research from...
The newly uncovered ShadowV2 botnet is rapidly becoming one of the most notable Mirai-based threats observed this year. Researchers at Fortinet detected the malware...
The ASUS router flaw has become a central piece of a sprawling global intrusion campaign known as Operation WrtHug, a coordinated effort attributed to...
Russian hackers targeted a United States engineering firm in what appears to be a significant escalation in Russia aligned cyber activity aimed at organizations...
A new malware campaign is abusing Blender asset files to install the StealC V2 information stealer on user systems. Threat actors are uploading booby...
The new leak surrounding China’s offensive cyber training systems has exposed one of the most revealing looks yet into the internal structure of the...
The U.S. Cybersecurity and Infrastructure Security Agency has issued a critical alert warning that advanced spyware campaigns are actively hijacking user accounts on major...
Researchers have uncovered a significant security issue involving popular online code beautifiers, where sensitive credentials and configuration data have been publicly exposed for years....
A large scale malware outbreak is sweeping through the npm ecosystem, compromising hundreds of packages and leaking sensitive developer secrets to GitHub at an...
ShadowPad, a modular espionage focused backdoor linked to long running Chinese threat operations, is being deployed through active exploitation of a recently patched Windows...
Security researchers have identified a cluster of vulnerabilities in Fluent Bit, the high performance open source telemetry agent used across major cloud and Kubernetes...