Multi-Plugin Malware Framework Installs Backdoor on Windows
10
Jan
2025

Multi-Plugin Malware Framework Installs Backdoor on Windows

The QSC Loader service DLL named “loader.dll” leverages two distinct methods to obtain the path to the Core module code….

PlugX Malware
10
Jan
2025

RedDelta Deploys PlugX Malware to Target Mongolia and Taiwan in Espionage Campaigns

Jan 10, 2025Ravie LakshmananCyber Espionage / Cyber Attack Mongolia, Taiwan, Myanmar, Vietnam, and Cambodia have been targeted by the China-nexus…

Phishers abuse CrowdStrike brand targeting job seekers with cryptominer
10
Jan
2025

Phishers abuse CrowdStrike brand targeting job seekers with cryptominer

Phishers abuse CrowdStrike brand targeting job seekers with cryptominer Pierluigi Paganini January 10, 2025 CrowdStrike warns of a phishing campaign…

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files
10
Jan
2025

New NonEuclid RAT Evades Antivirus and Encrypts Critical Files

A NonEuclid sophisticated C# Remote Access Trojan (RAT) designed for the.NET Framework 4.8 has been shown to pose a significant…

Banshee Stealer Hits macOS Users via Fake GitHub Repositories
10
Jan
2025

Banshee Stealer Hits macOS Users via Fake GitHub Repositories

SUMMARY Banshee Stealer targets macOS users, distributed via fake GitHub repositories and phishing sites. The malware steals browser credentials, cryptocurrency…

Samsung Devices
10
Jan
2025

Google Project Zero Researcher Uncovers Zero-Click Exploit Targeting Samsung Devices

Jan 10, 2025Ravie LakshmananCybersecurity / Android Cybersecurity researchers have detailed a now-patched security flaw impacting Monkey’s Audio (APE) decoder on…

Microsoft Fixes Outlook Client Freeze Issue When Copying Text Using Ctrl+C
10
Jan
2025

Microsoft Fixes Outlook Client Freeze Issue When Copying Text Using Ctrl+C

Microsoft has resolved a persistent issue that caused classic Outlook to freeze or hang when users attempted to copy text…

Microsegmentation For all Users, Workloads and Devices by Elisity
10
Jan
2025

Microsegmentation For all Users, Workloads and Devices by Elisity

Network segmentation remains a critical security requirement, yet organizations struggle with traditional approaches that demand extensive hardware investments, complex policy…

Juniper Networks Vulnerability Let Remote Attacker Execute Network Attacks
10
Jan
2025

Juniper Networks Vulnerability Let Remote Attacker Execute Network Attacks

Juniper Networks has disclosed a significant vulnerability affecting its Junos OS and Junos OS Evolved platforms. Identified as CVE-2025-21598, this…

HexaLocker V2 login page
10
Jan
2025

HexaLocker V2 Reveals New Stealth Features And Tactics

HexaLocker V2 has arrived on the market. This new version of the notorious HexaLocker ransomware has brought with it a…

Darktrace to Acquire Cado Security to Enhance Cloud Forensic Capabilities
10
Jan
2025

Darktrace to Acquire Cado Security to Enhance Cloud Forensic Capabilities

Darktrace, a global leader in AI cybersecurity, has announced plans to acquire Cado Security, a UK-based cyber investigation and response…

$12.9 Billion Cybersecurity Boom Awaits India By 2030
10
Jan
2025

$12.9 Billion Cybersecurity Boom Awaits India By 2030

India is witnessing a digital revolution, but along with it comes a daunting challenge—securing its massive digital infrastructure. With over…