China-linked APT group Winnti targets Japanese organizations
18
Feb
2025

China-linked APT group Winnti targets Japanese organizations

China-linked APT group Winnti targets Japanese organizations since March 2024 Pierluigi Paganini February 18, 2025 China-linked threat actor Winnti targeted…

Hackerone logo
18
Feb
2025

A New Approach to Proving Cybersecurity Value (That Isn’t ROI)

Over the past 8 months, Luke (hakluke) Stephens and I have spoken with 10 security executives, surveyed over 550 security professionals,…

Highly Obfuscated .NET sectopRAT Mimic as Chrome Extension
18
Feb
2025

Highly Obfuscated .NET sectopRAT Mimic as Chrome Extension

SectopRAT, also known as Arechclient2, is a sophisticated Remote Access Trojan (RAT) developed using the .NET framework. This malware is…

Snake Keylogger Variant Hits Windows, Steals Data via Telegram Bots
18
Feb
2025

Snake Keylogger Variant Hits Windows, Steals Data via Telegram Bots

The New Snake Keylogger variant targets Windows users via phishing emails, using AutoIt for stealth. Learn how it steals credentials…

BlackLock ransomware onslaught: What to expect and how to fight it
18
Feb
2025

BlackLock ransomware onslaught: What to expect and how to fight it

BlackLock is on track to become the most active ransomware-as-a-service (RaaS) outfit in 2025, according to ReliaQuest. Its success is…

Pentera - Key inserted into lock
18
Feb
2025

Why a Checklist Won’t Stop Cyberattacks

By Autumn Stambaugh, Senior Sales Engineer at Pentera Think you’re safe because you’re compliant? Think again. Recent studies continue to…

Weaponized PDFs Deliver Lumma InfoStealer Targeting Educational Institutions
18
Feb
2025

Weaponized PDFs Deliver Lumma InfoStealer Targeting Educational Institutions

A sophisticated malware campaign leveraging the Lumma InfoStealer has been identified, targeting educational institutions to distribute malicious files disguised as…

Naveen Goud
18
Feb
2025

The Rising Threat of Cybercrime: The Emergence of “Fraud-As-A-Service” (FaaS)

In recent years, cyber crime has evolved into a highly sophisticated and organized business model. One of the most alarming…

Evade Detection in Targeted Cyber Attacks
18
Feb
2025

Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks

Feb 18, 2025Ravie LakshmananCyber Espionage / Malware The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing…

EY: Industrial companies worldwide stunted in emerging technology use
18
Feb
2025

EY: Industrial companies worldwide stunted in emerging technology use

Many companies from a range of industries worldwide are stuck at a trial stage of emerging technologies usage, according to…

New Variant of XCSSET Malware Targets macOS Notes and Wallets
18
Feb
2025

New Variant of XCSSET Malware Targets macOS Notes and Wallets

Microsoft warns Apple developers about a new XCSSET malware variant targeting macOS, posing security risks through stealthy infections and data…

Intruder Enhances Free Vulnerability Intelligence Platform ‘Intel’ with AI-Generated CVE Descriptions
18
Feb
2025

Intruder Enhances Free Vulnerability Intelligence Platform ‘Intel’ with AI-Generated CVE Descriptions

Intel by Intruder now uses AI to contextualize NVD descriptions, helping security teams assess risk faster. Intruder, a leader in…