Pro-Ukraine Group Targets Russian Developers with Python Backdoor
ReversingLabs discovers dbgpkg, a fake Python debugger that secretly backdoors systems to steal data. Researchers suspect a pro-Ukraine hacktivist group is behind the attack on…
ReversingLabs discovers dbgpkg, a fake Python debugger that secretly backdoors systems to steal data. Researchers suspect a pro-Ukraine hacktivist group is behind the attack on…
Hackers from the Scattered Spider group, known for UK retail attacks, are now targeting US retailers, Google cybersecurity experts have warned. The notorious cybercriminal group…
Coinbase insider breach: Bribed overseas agents stole user data; company rejects ransom, offers $20M reward, boosts security, and cooperates with law enforcement. Coinbase, the largest…
A wave of Google algorithm changes in 2025 has hit Reddit hard, cutting deep into its organic traffic. Although Reddit’s core user base remains stable,…
A new wave of attacks uses PowerShell and LNK files to secretly install Remcos RAT, enabling full remote control and surveillance of infected systems. Cybersecurity…
FrigidStealer malware targets macOS users via fake browser updates, stealing passwords, crypto wallets, and notes using DNS-based data theft methods. A known strain of macOS…
Credential protection is key to preventing breaches. Secure APIs, rotate secrets and train devs to handle credentials safely and efficiently. Your organization’s security hinges on…
Over the years, many different technologies have transitioned to Cloud-based solutions, including ERP systems and email management platforms. Phone systems are no different, leveraging VoIP…
Police in Europe have shut down a fake online trading platform that scammed hundreds of victims out of €3 million in a coordinated global operation…
There is a lot of money in cyberattacks like ransomware, and unfortunately for organizations of all sizes, the cybercrime business is booming. Ransomware has come…
Flashpoint uncovers how North Korean hackers used fake identities to secure remote IT jobs in the US, siphoning $88 million. Find out how they used…
Weak passwords continue to be a major vulnerability for FTP servers. Specops’ latest report highlights the most frequent passwords used in attacks and offers advice…