Pathfinder AI - Hunters Announces New AI Capabilities for Smarter SOC Automation
04
Mar
2025

Pathfinder AI – Hunters Announces New AI Capabilities for Smarter SOC Automation

Pathfinder AI expands Hunters’ vision for AI-driven SOCs, introducing Agentic AI for autonomous investigation and response. Hunters, the leader in…

Pathfinder AI - Hunters Announces New AI Capabilities with for Smarter SOC Automation
04
Mar
2025

Pathfinder AI – Hunters Announces New AI Capabilities with for Smarter SOC Automation

Pathfinder AI expands Hunters’ vision for AI-driven SOCs, introducing Agentic AI for autonomous investigation and response. Hunters, the leader in…

Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs
04
Mar
2025

Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs

In a concerning development, cybercriminals are increasingly targeting cloud-based generative AI (GenAI) services in a new attack vector dubbed “LLMjacking.”…

CACTUS Ransomware
04
Mar
2025

Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates

Mar 04, 2025Ravie LakshmananCybercrime / Threat Intelligence Threat actors deploying the Black Basta and CACTUS ransomware families have been found…

More than 86K IoT devices compromised by fast-growing Eleven11 botnet
04
Mar
2025

More than 86K IoT devices compromised by fast-growing Eleven11 botnet

Security researchers warn that a malicious botnet exploiting internet of things devices for DDoS attacks is rapidly spreading since it…

New Android RAT Dubbed “AndroRAT” Attacking to Steal Pattern, PIN & Passcodes
04
Mar
2025

New Android RAT Dubbed “AndroRAT” Attacking to Steal Pattern, PIN & Passcodes

A newly identified variant of the Android Remote Access Tool (RAT), AndroRAT, has emerged as a critical cybersecurity threat, leveraging…

Google Secretly Tracks Android Devices Even Without User-Opened Apps
04
Mar
2025

Google Secretly Tracks Android Devices Even Without User-Opened Apps

A recent technical study conducted by researchers at Trinity College Dublin has revealed that Google collects and stores extensive user…

JavaGhost Uses Amazon IAM Permissions to Phish Organizations
04
Mar
2025

JavaGhost Uses Amazon IAM Permissions to Phish Organizations

Unit 42 uncovers JavaGhost’s evolving AWS attacks. Learn how this threat actor uses phishing, IAM abuse, and advanced evasion techniques,…

Naveen Goud
04
Mar
2025

CISA issues warning against Qilin ransomware group

A day after rejecting claims that the US government had ceased surveillance operations against Russia and its affiliated threat groups,…

Rubrik discloses server breach, compromise of ‘access information’
04
Mar
2025

Rubrik discloses server breach, compromise of ‘access information’

Dive Brief: In a blog post on Feb. 22, Rubrik said its security team recently discovered “anomalous activity” on a…

Hacker
04
Mar
2025

New polyglot malware hits aviation, satellite communication firms

A previously undocumented polyglot malware is being deployed in attacks against aviation, satellite communication, and critical transportation organizations in the United…

Hackers Hijacking Access to Cloud-based AI models With Exposed Keys With 19 Minutes
04
Mar
2025

Hackers Hijacking Access to Cloud-based AI models With Exposed Keys With 19 Minutes

New research reveals that threat actors are exploiting exposed cloud credentials to hijack enterprise AI systems within minutes of credential…