RedGolf Hackers Linked to Fortinet Zero-Day Exploits and Cyber Attack Tools

Security researchers have linked the notorious RedGolf hacking group to…

⚡ THN Weekly Recap: iOS Zero-Days, 4Chan Breach, NTLM Exploits, WhatsApp Spyware & More

Can a harmless click really lead to a full-blown cyberattack?…

5 Reasons Device Management Isn’t Device Trust​

The problem is simple: all breaches start with initial access,…

Hackers Claim to Sell ‘Baldwin Killer’ Malware That Evades AV and EDR

A notorious threat actor has allegedly begun selling “Baldwin Killer,”…

Hackers Bypassed Windows Defender Policies Using WinDbg Preview via Microsoft Store

A newly documented technique reveals how attackers can exploit the…

Chinese Hackers Target Linux Systems Using SNOWLIGHT Malware and VShell Tool

The China-linked threat actor known as UNC5174 has been attributed…

Medusa Rides Momentum From Ransomware-as-a-Service Pivot

Shifting to a RaaS business model has accelerated the group's…

DeepSeek Generating Fully Working Keyloggers & Data Exfiltration Tools

Security researchers at Unit 42 have successfully prompted DeepSeek, a…

Orion Security Startup Tackles Insider Threats With AI

The data loss prevention company emerges from stealth with an…

Hackers Could Drop Teams Malware via Browser’s Cache Smuggling

A novel attack vector combining browser cache exploitation and DLL…