The data-stealing malware initially targeted users in Turkey but has since evolved into a global threat. ​The original article found on darkreading Read More
Category: Cyber Security News
Victoria’s Secret Delays Earnings Call Due to Cyber Incident
But that didn’t stop the clothing retailer from issuing preliminary results for the first quarter of 2025. ​The original article found on darkreading Read More
Chrome Drops Trust for Chunghwa, Netlock Certificates
Digital certificates authorized by the authorities will no longer have trust by default in the browser starting in August, over what Google said is a […]
LummaC2 Fractures as Acreed Malware Becomes Top Dog
LummaC2 formerly accounted for almost 92% of Russian Market’s credential theft log alerts. Now, the Acreed infostealer has replaced its market share. ​The original article […]
Google patches third zero-day flaw in Chrome this year
The Google Chrome team issued an update to fix a high-severity vulnerability that is being actively exploited in the wild. The issue was also mitigated […]
Chrome Drops Trust for Chunghwa, Netlock Certificates
Digital certificates authorized by the authorities will no longer have trust by default in the browser starting in August, over what Google said is a […]
New Linux PumaBot Targets IoT Devices with SSH Credential Brute-Force Attack
A new and insidious threat has surfaced in the cybersecurity landscape as Darktrace’s Threat Research team uncovers PumaBot, a Go-based Linux botnet meticulously designed to […]
Russian Hacker Black Owl Targets Critical Industries to Steal Financial Data
A pro-Ukrainian hacktivist group known as BO Team, also operating under aliases such as Black Owl, Lifting Zmiy, and Hoody Hyena, has emerged as a […]
Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack
Threat hunters are alerting to a new campaign that employs deceptive websites to trick unsuspecting users into executing malicious PowerShell scripts on their machines and […]
Researchers Reveal Container-Based Attacks Through Host-Based Log Analysis
Cybersecurity researchers have shed light on the often-underestimated vulnerabilities in containerized environments, emphasizing the critical role of host-based log analysis in uncovering sophisticated attacks. Containers, […]