In 2025, businesses face growing challenges in securing their digital assets, networks, and sensitive data. The rise in sophisticated cyberattacks has made end-to-end threat intelligence […]
Detour Dog Caught Running DNS-Powered Malware Factory for Strela Stealer
A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known as Strela Stealer. That’s according to findings from […]
Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads
The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their website, even as the flagship […]
Top 10 Best Supply Chain Risk Management Solutions in 2025
In today’s globalized world, managing supply chain risks has become a top priority for businesses. From cybersecurity threats and compliance issues to supplier sustainability and […]
Jaguar Land Rover Shows Cyberattacks Mean (Bad) Business
The company likely failed to completely clean out attackers from a previous breach and now is a case study for the high cost of ransomware. […]
New Android Spyware Targeting Users by Imitating Signal and ToTok Apps
ESET researchers have uncovered two sophisticated Android spyware campaigns that target users seeking secure communication platforms by impersonating popular messaging apps Signal and ToTok. These […]
BCI: The Thing of Nightmare or Dreams?
Brain computer interface technology looks to provide users with hands-free device control, but could security ever keep up with the risks? ​The original article found […]
Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL
Brazilian users have emerged as the target of a new self-propagating malware that spreads via the popular messaging app WhatsApp. The campaign, codenamed SORVEPOTEL by […]
New XWorm V6 Variant Embeds Malicious Code into Trusted Windows Applications
In the constantly evolving world of cyber threats, staying informed is not just an advantage; it’s a necessity. First observed in 2022, XWorm quickly gained […]
DrayOS Router Flaw Allows Remote Code Execution by Attackers
A critical vulnerability affecting DrayOS routers could let unauthenticated attackers execute code remotely. Discovered on July 22 by Pierre-Yves Maes of ChapsVision, the flaw stems […]