Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware
Oct 02, 2025Ravie LakshmananMalware / Cyber Espionage The threat actor known as Confucius has been attributed to a new phishing campaign that has targeted Pakistan…
Oct 02, 2025Ravie LakshmananMalware / Cyber Espionage The threat actor known as Confucius has been attributed to a new phishing campaign that has targeted Pakistan…
Oct 02, 2025Ravie LakshmananPython / Malware Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository that claims to offer the…
Oct 02, 2025Ravie LakshmananRansomware / Threat Intelligence Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that they are tracking a new cluster of…
Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation, it is time we automate the delivery of…
Running a SOC often feels like drowning in alerts. Every morning, dashboards light up with thousands of signals; some urgent, many irrelevant. The job is…
Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like Signal and ToTok to target users in the United…
Oct 01, 2025Ravie LakshmananEncryption / Hardware Security In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated that…
Oct 01, 2025Ravie LakshmananVulnerability / API Security A high-severity security flaw has been disclosed in the One Identity OneLogin Identity and Access Management (IAM) solution…
Oct 01, 2025Ravie LakshmananAI Security / Cloud Security A severe security flaw has been disclosed in the Red Hat OpenShift AI service that could allow…
Oct 01, 2025The Hacker NewsAutomation / IT Operations AI is changing automation—but not always for the better. That’s why we’re hosting a new webinar, “Workflow…
Oct 01, 2025The Hacker NewsAttack Surface / Artificial Intelligence Bitdefender’s 2025 Cybersecurity Assessment Report paints a sobering picture of today’s cyber defense landscape: mounting pressure…
Oct 01, 2025Ravie LakshmananVulnerability / Malware Unknown threat actors are abusing Milesight industrial cellular routers to send SMS messages as part of a smishing campaign…