
- Keywords: Try specific terms like "ransomware", "zero-day", "phishing"
- Companies: Search for specific companies like "Microsoft", "Google"
- CVE IDs: Search for specific vulnerabilities using CVE numbers
Latest Articles 78 articles
North Korean Lazarus Group Targets South Korean Companies Exploiting Software Vulnerabilities
The notorious North Korean hacking group Lazarus is suspected of breaching at least six South Korean organizations in a...
Read More
Stealth Linux Rootkit Exploits io_uring to Evade Detection
A novel rootkit, dubbed Curing, is demonstrating how attackers can use Linux's advanced io_uring asynchronous I/O...
Read More
Darcula Phishing Service Now Weaponized with AI
The Darcula phishing-as-a-service platform just got a whole lot more dangerous. Cybercriminals using the service now...
Read More
North Korean Hackers Drain $137 Million in TRON Cryptocurrency Heist
A massive, coordinated phishing attack has reportedly netted North Korean hacking groups a staggering $137 million from...
Read More
Fake Job Offers Used to Spread Iranian Malware in Israel
An Iranian hacking group, tracked as UNC2428, is suspected of using a sophisticated social engineering campaign...
Read More
Russian Military Targeted by Android Spyware Masquerading as Mapping App
A new Android spyware campaign is targeting Russian military personnel, researchers warn. The malware is cleverly...
Read More
Russian Hackers Weaponize Microsoft OAuth Against Ukraine Allies
Suspected Russian hacking groups have been actively exploiting a vulnerability in Microsoft's OAuth authorization...
Read More
North Korean Hackers Leverage Old Windows Flaw in Attacks Targeting South Korea and Japan
A notorious North Korean hacking group, Kimsuky, is back in action, leveraging a well-known but unpatched vulnerability...
Read More