‘HoldingHands’ Acts Like a Pickpocket With Taiwan Orgs

Since at least January, the threat actor has been employing…

Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor

A now-patched security flaw in Google Chrome was exploited as…

New Sorillus RAT Targets European Organizations Through Tunneling Services

An important development discovered in March 2025 by Orange Cyberdefense’s…

New Chaos RAT Variants Targeting Windows and Linux Systems to Steal Sensitive Data

The Acronis Threat Research Unit has identified new variants of…

New KimJongRAT Stealer Uses Weaponized LNK File to Deploy PowerShell-Based Dropper

The two new variants of the KimJongRAT stealer have emerged,…

DragonForce Ransomware Targets Major UK Retailers, Including Harrods, Marks & Spencer, and Co-Op

Major UK retailers including Harrods, Marks and Spencer, and Co-Op…

Xanthorox Emerging BlackHat AI Tool Empowering Hackers in Phishing and Malware Campaigns

Artificial intelligence platform named Xanthorox has emerged as a potent…

Russian Hackers Exploit XSS Vulnerabilities to Inject Malicious Code into Email Servers

A sophisticated cyberespionage campaign, dubbed Operation RoundPress, has been uncovered…

CISA Alerts on Threat Actors Targeting Commvault Azure App to Steal Secrets

On May 22, 2025, Commvault, a leading enterprise data backup…

Webinar: Learn How to Build a Reasonable and Legally Defensible Cybersecurity Program

It’s not enough to be secure. In today’s legal climate,…

Active Directory Recovery Can’t Be an Afterthought

Active Directory is one of the most vulnerable access points in an organization’s IT environment. Companies cannot wait for a real attack to pressure-test their […]