Threat Actors Trojanize Popular Games to Evade Security and Infect Systems
18
Feb
2025

Threat Actors Trojanize Popular Games to Evade Security and Infect Systems

A sophisticated malware campaign was launched by cybercriminals, targeting users through trojanized versions of popular games. Exploiting the holiday season’s…

OpenSSH
18
Feb
2025

New OpenSSH Flaws Enable Man-in-the-Middle and DoS Attacks — Patch Now

Feb 18, 2025Ravie LakshmananVulnerability / Network Security Two security vulnerabilities have been discovered in the OpenSSH secure networking utility suite…

DeepSeek-R1: Budgeting challenges for on-premise deployments
18
Feb
2025

DeepSeek-R1: Budgeting challenges for on-premise deployments

Until now, IT leaders have needed to consider the cyber security risks posed by allowing users to access large language…

China-linked APT group Winnti targets Japanese organizations
18
Feb
2025

China-linked APT group Winnti targets Japanese organizations

China-linked APT group Winnti targets Japanese organizations since March 2024 Pierluigi Paganini February 18, 2025 China-linked threat actor Winnti targeted…

Hackerone logo
18
Feb
2025

A New Approach to Proving Cybersecurity Value (That Isn’t ROI)

Over the past 8 months, Luke (hakluke) Stephens and I have spoken with 10 security executives, surveyed over 550 security professionals,…

Highly Obfuscated .NET sectopRAT Mimic as Chrome Extension
18
Feb
2025

Highly Obfuscated .NET sectopRAT Mimic as Chrome Extension

SectopRAT, also known as Arechclient2, is a sophisticated Remote Access Trojan (RAT) developed using the .NET framework. This malware is…

Snake Keylogger Variant Hits Windows, Steals Data via Telegram Bots
18
Feb
2025

Snake Keylogger Variant Hits Windows, Steals Data via Telegram Bots

The New Snake Keylogger variant targets Windows users via phishing emails, using AutoIt for stealth. Learn how it steals credentials…

18
Feb
2025

BlackLock ransomware onslaught: What to expect and how to fight it

BlackLock is on track to become the most active ransomware-as-a-service (RaaS) outfit in 2025, according to ReliaQuest. Its success is…

Pentera - Key inserted into lock
18
Feb
2025

Why a Checklist Won’t Stop Cyberattacks

By Autumn Stambaugh, Senior Sales Engineer at Pentera Think you’re safe because you’re compliant? Think again. Recent studies continue to…

Weaponized PDFs Deliver Lumma InfoStealer Targeting Educational Institutions
18
Feb
2025

Weaponized PDFs Deliver Lumma InfoStealer Targeting Educational Institutions

A sophisticated malware campaign leveraging the Lumma InfoStealer has been identified, targeting educational institutions to distribute malicious files disguised as…

Naveen Goud
18
Feb
2025

The Rising Threat of Cybercrime: The Emergence of “Fraud-As-A-Service” (FaaS)

In recent years, cyber crime has evolved into a highly sophisticated and organized business model. One of the most alarming…

Evade Detection in Targeted Cyber Attacks
18
Feb
2025

Chinese Hackers Exploit MAVInject.exe to Evade Detection in Targeted Cyber Attacks

Feb 18, 2025Ravie LakshmananCyber Espionage / Malware The Chinese state-sponsored threat actor known as Mustang Panda has been observed employing…