Malware Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia by admin January 2, 2026 by admin January 2, 2026 The threat actor known as Transparent Tribe has been attributed to a fresh set… 0 FacebookTwitterPinterestEmail
Malware How the open-source engine drives today’s browsers – Computerworld by admin January 2, 2026 by admin January 2, 2026 IE Mode, which allows legacy Internet Explorer–dependent apps to run on the Trident engine… 0 FacebookTwitterPinterestEmail
Malware DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide by admin December 31, 2025 by admin December 31, 2025 The threat actor behind two malicious browser extension campaigns, ShadyPanda and GhostPoster, has been… 0 FacebookTwitterPinterestEmail
Malware Researchers Spot Modified Shai-Hulud Worm Testing Payload on npm Registry by admin December 31, 2025 by admin December 31, 2025 Dec 31, 2026Ravie LakshmananCybersecurity / Malware Cybersecurity researchers have disclosed details of what appears… 0 FacebookTwitterPinterestEmail
Malware So geht Post-Incident Review | CSO Online by admin December 31, 2025 by admin December 31, 2025 Jede neue Entdeckung – etwa mit Blick auf das Einfallstor für den Angriff, seinen… 0 FacebookTwitterPinterestEmail
Malware Silver Fox Targets Indian Users With Tax-Themed Emails Delivering ValleyRAT Malware by admin December 30, 2025 by admin December 30, 2025 The threat actor known as Silver Fox has turned its focus to India, using… 0 FacebookTwitterPinterestEmail
Malware The top Google Pixel tips of 2025 – Computerworld by admin December 30, 2025 by admin December 30, 2025 More and more, there are Android tips — and then there are Pixel tips.… 0 FacebookTwitterPinterestEmail
Malware Mustang Panda Uses Signed Kernel-Mode Rootkit to Load TONESHELL Backdoor by admin December 30, 2025 by admin December 30, 2025 Dec 30, 2026Ravie LakshmananMalware / Cyber Espionage The Chinese hacking group known as Mustang… 0 FacebookTwitterPinterestEmail
Malware 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials by admin December 29, 2025 by admin December 29, 2025 Cybersecurity researchers have disclosed details of what has been described as a “sustained and… 0 FacebookTwitterPinterestEmail
Malware Tipps für CISOs, die die Branche wechseln wollen by admin December 29, 2025 by admin December 29, 2025 CISOs, die einer neuen Branche durchstarten möchten, sollten außerdem möglichst früh demonstrieren, dass ihre… 0 FacebookTwitterPinterestEmail