XCSSET Malware Mutates Again, Expands Reach To Firefox
Microsoft researchers say the long-running XCSSET malware has resurfaced with a new arsenal of tricks aimed at stealing data, persisting on devices, and hijacking cryptocurrency…
Microsoft researchers say the long-running XCSSET malware has resurfaced with a new arsenal of tricks aimed at stealing data, persisting on devices, and hijacking cryptocurrency…
Burp Enterprise Pros: Offers granular control and customization to fit the distinct needs of a mature security program. Empowers expert teams with a strong DAST…
Cybercriminals have launched a sophisticated supply chain attack targeting cryptocurrency developers through malicious Rust crates designed to steal digital wallet keys. Two fraudulent packages, faster_log…
Threat actors recently infiltrated a corporate environment, dumped the AD database file NTDS.dit, and nearly achieved full domain control. AD acts as the backbone of…
Exploitation of a recently disclosed Fortra GoAnywhere MFT vulnerability started at least one week before patches were released, cybersecurity firm watchTowr reports. Fortra fixed the…
We know the importance of staying ahead of threats. At Detectify, we’re committed to providing you with the tools you need to secure your applications…
Cisco warns of a Critical remote code execution flaw in web services across multiple Cisco platforms. Tracked as CVE-2025-20363 (CWE-122), this vulnerability carries a CVSS…
In early 2025, LummaStealer was in widespread use by cybercriminals targeting victims throughout the world in multiple industry verticals, including telecom, healthcare, banking, and marketing.…
The threat of an OT cyber-attack isn’t just an operational risk. It’s also a financial one. Companies across critical infrastructure and process industries spend billions…
Artificial intelligence (AI) infrastructure provider Nscale has secured $1.1bn in series B funding, a week after it was announced the firm would be working with…
A novel AI-driven threat leverages LLMs on Hugging Face to execute adaptive reconnaissance and data exfiltration in real time. Rather than relying on static scripts…
Google warns of Brickstorm backdoor targeting U.S. legal and tech sectors Pierluigi Paganini September 26, 2025 China-linked actors used Brickstorm malware to spy on U.S.…