APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures

The Russian state-sponsored threat actor known as APT29 has been…

Rogue npm Packages Mimic Telegram Bot API to Plant SSH Backdoors on Linux Systems

Cybersecurity researchers have uncovered three malicious packages in the npm…

Chinese Hackers Exploit Ivanti Connect Secure Flaw to Gain Unauthorized Access

In a sophisticated cyber-espionage operation, a group known as UNC5221,…

10 Best Cloud Security Solutions 2025

In today’s digital era, businesses are increasingly adopting cloud computing…

10 Best Patch Management Tools 2025

In today’s digital landscape, maintaining secure and efficient IT systems…

Fake DeepSeek Ads Spread Malware to Google Users

Popularity of the generative AI platform makes it an obvious…

CISA Warns of Sitecore RCE Flaws; Active Exploits Hit Next.js and DrayTek Devices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added…

Threat Actor Tied to LockBit Ransomware Targets Fortinet Users

The Mora_001 group uses similar post-exploitation patterns and ransomware customization…

Researchers Uncover Stealthy Tactics and Techniques of StrelaStealer Malware

Cybersecurity experts have recently shed light on the sophisticated operations…

ClickFake Interview – Lazarus Hackers Exploit Windows and macOS Users Fake Job Campaign

The Lazarus Group, a North Korean state-sponsored hacking collective, has…