Hacking Default Credentials Exploited In Polish Energy Grid Attack by admin January 31, 2026 by admin January 31, 2026 A cyberattack by Russian state-sponsored threat actors that targeted at least 30 wind and… 0 FacebookTwitterPinterestEmail
Malware Phishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access by admin January 23, 2026 by admin January 23, 2026 Ravie LakshmananJan 23, 2026Email Security / Endpoint Security Cybersecurity researchers have disclosed details of… 0 FacebookTwitterPinterestEmail
Hacking LastPass warns of phishing campaign targeting vault credentials by admin January 23, 2026 by admin January 23, 2026 A newly discovered phishing campaign is targeting LastPass users with convincingly crafted emails urging… 0 FacebookTwitterPinterestEmail
Malware Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto by admin January 20, 2026 by admin January 20, 2026 Ravie LakshmananJan 20, 2026Cloud Security / Developer Security Cybersecurity researchers have disclosed details of… 0 FacebookTwitterPinterestEmail
Malware GoBruteforcer Botnet Targets Crypto Project Databases by Exploiting Weak Credentials by admin January 12, 2026 by admin January 12, 2026 A new wave of GoBruteforcer attacks has targeted databases of cryptocurrency and blockchain projects… 0 FacebookTwitterPinterestEmail
Malware 27 Malicious npm Packages Used as Phishing Infrastructure to Steal Login Credentials by admin December 29, 2025 by admin December 29, 2025 Cybersecurity researchers have disclosed details of what has been described as a “sustained and… 0 FacebookTwitterPinterestEmail
Hacking Fake Chrome VPN extensions hijack traffic and steal user credentials by admin December 24, 2025 by admin December 24, 2025 Two malicious Chrome extensions posing as VPN tools under the name Phantom Shuttle (幻影穿梭)… 0 FacebookTwitterPinterestEmail
Malware FortiGate firewall credentials being stolen after vulnerabilities discovered by admin December 17, 2025 by admin December 17, 2025 The authentication bypass vulnerabilities, CVE-2025-59718 and CVE-2025-59719, are in the Fortinet FortiOS operating system… 0 FacebookTwitterPinterestEmail
Malware Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign by admin December 16, 2025 by admin December 16, 2025 Dec 16, 2025Ravie LakshmananMalware / Threat Detection An ongoing campaign has been observed targeting… 0 FacebookTwitterPinterestEmail
Malware New Advanced Phishing Kits Use AI and MFA Bypass Tactics to Steal Credentials at Scale by admin December 12, 2025 by admin December 12, 2025 Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and… 0 FacebookTwitterPinterestEmail