KoiLoader Exploits PowerShell Scripts to Drop Malicious Payloads
Cybersecurity experts at eSentire’s Threat Response Unit (TRU) uncovered a sophisticated malware campaign leveraging KoiLoader, a malicious loader designed to...
Read more →Cybersecurity experts at eSentire’s Threat Response Unit (TRU) uncovered a sophisticated malware campaign leveraging KoiLoader, a malicious loader designed to...
Read more →As the U.S. tax filing deadline approaches, cybercriminals are intensifying their efforts to exploit taxpayers through a new wave of...
Read more →Ransomware continues to be one of the most disruptive cyber threats, with recent data revealing that it affects 93% of...
Read more →The Sliver Command & Control (C2) framework, an open-source tool written in Go, has been a popular choice for offensive...
Read more →Microsoft has disclosed the discovery of multiple critical vulnerabilities within the GRUB2, U-Boot, and Barebox bootloaders, leveraging its AI-driven Security...
Read more →Apple has issued an urgent security advisory concerning three critical zero-day vulnerabilities – CVE-2025-24200, CVE-2025-24201, and CVE-2025-24085 – which are being actively exploited in...
Read more →A major data breach involving LensDeal, a Netherlands-based contact lens supplier, has reportedly exposed the personal information of over 100,000...
Read more →A colossal 400GB trove containing data from 2.873 billion X (formerly Twitter) users has surfaced on hacker forums. The breach,...
Read more →PortSwigger, the makers of Burp Suite, has taken a giant leap forward in the field of cybersecurity with the launch...
Read more →Chord Specialty Dental Partners is under scrutiny after revealing a data breach that compromised the personal and health information of...
Read more →Kentico Xperience CMS, a widely used platform designed for enterprises and organizations, is under scrutiny after a vulnerability chain was...
Read more →Rockwell Automation has identified a critical flaw in its Verve Asset Manager software, exposing industrial systems to potential exploitation. The vulnerability, tracked...
Read more →