PLAYFULGHOST, a Gh0st RAT variant, leverages distinct traffic patterns and encryption, which spread via phishing emails and SEO poisoning of…
FeedSpot named Cybercrime Magazine no. 1 on it’s list of 20 Best Cybercrime Blogs you should follow in 2025. The best…
The CVE-2024-49112 vulnerability in Windows LDAP allows remote code execution on unpatched Domain Controllers, as a zero-click exploit leverages this…
A new ransomware strain, dubbed Nitrogen, has emerged as a significant threat over the past four months, targeting organizations across…
A cybersecurity researcher has demonstrated a method to bypass BitLocker encryption on Windows 11 (version 24H2) by extracting full volume…
Jan 02, 2025Ravie LakshmananCyber Espionage / Hacking German prosecutors have charged three Russian-German nationals for acting as secret service agents…
The first night of New Year brought in a terrifying moment for me that many professionals fear in the online…
Researchers have demonstrated a method to bypass Windows 11’s BitLocker encryption, enabling the extraction of Full Volume Encryption Keys (FVEKs)…
72 Hours to Audit-Ready API Security APIs present a unique challenge in this landscape, as risk assessment and mitigation are…
Jan 02, 2025The Hacker NewsCloud Security / Threat Intelligence In the past year, cross-domain attacks have gained prominence as an…
The government has started the new year by ramping up its support for Horizon, the European-wide research initiative. Horizon, which…
Three Russian-German nationals charged with suspicion of secret service agent activity Pierluigi Paganini January 02, 2025 German authorities have charged three Russian-German…











