The Most Active RAT Uses New Stagers and Loaders to Bypass Defenses
05
Jul
2025

The Most Active RAT Uses New Stagers and Loaders to Bypass Defenses

XWorm has emerged as one of the most versatile and actively distributed remote access trojans in the current threat landscape,…

How Digital Executive Protection Shields Top Leaders from Modern Threats
05
Jul
2025

How Digital Executive Protection Shields Top Leaders from Modern Threats

Cybersecurity threats have emerged so quickly that most companies struggle to keep up and executives are often the first targets….

Threat Actors Abused AV - EDR Evasion Framework In-The-Wild to Deploy Malware Payloads
05
Jul
2025

Threat Actors Abused AV – EDR Evasion Framework In-The-Wild to Deploy Malware Payloads

Cybersecurity researchers have uncovered a concerning development as malicious actors began exploiting SHELLTER, a commercial anti-virus and endpoint detection response…

Android May Soon Warn You About Fake Cell Towers
05
Jul
2025

Android May Soon Warn You About Fake Cell Towers

In recent years, North Korea has deployed thousands of so-called IT workers to infiltrate Western businesses, get paid salaries, and…

Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence
05
Jul
2025

Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Persistence

The cybercriminal group known as Scattered Spider has significantly evolved its attack methodologies, demonstrating alarming sophistication in exploiting legitimate administrative…

Hackers Exploit Legitimate Inno Setup Installer to Use as a Malware Delivery Vehicle
05
Jul
2025

Hackers Exploit Legitimate Inno Setup Installer to Use as a Malware Delivery Vehicle

Cybercriminals have increasingly turned to legitimate software installation frameworks as vehicles for malware distribution, with Inno Setup emerging as a…

Why you should never pay to get paid
05
Jul
2025

Why you should never pay to get paid

Some schemes might sound unbelievable, but they’re easier to fall for than you think. Here’s how to avoid getting played…

Researchers Uncover New Technique to Exploit Azure Arc for Hybrid Escalation in Enterprise Environment and Maintain Persistence
05
Jul
2025

Researchers Uncover New Technique to Exploit Azure Arc for Hybrid Escalation in Enterprise Environment and Maintain Persistence

Cybersecurity researchers have discovered a sophisticated attack technique that exploits Microsoft Azure Arc deployments to gain persistent access to enterprise…

Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS
05
Jul
2025

Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS

Threat actors are weaponizing exposed Java Debug Wire Protocol (JDWP) interfaces to obtain code execution capabilities and deploy cryptocurrency miners…

How to get into cybersecurity
05
Jul
2025

How to get into cybersecurity

Cracking the code of a successful cybersecurity career starts here. Hear from ESET’s Robert Lipovsky as he reveals how to…

Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties
05
Jul
2025

Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties

Jul 05, 2025Ravie LakshmananNational Security / Privacy Taiwan’s National Security Bureau (NSB) has warned that China-developed applications like RedNote (aka…

Hackers Exploiting Java Debug Wire Protocol Servers in Wild to Deploy Cryptomining Payload
05
Jul
2025

Hackers Exploiting Java Debug Wire Protocol Servers in Wild to Deploy Cryptomining Payload

A new wave of cyberattacks is targeting organizations that inadvertently expose Java Debug Wire Protocol (JDWP) servers to the internet,…