Vulnerability North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware by admin December 9, 2025 by admin December 9, 2025 Threat actors with ties to North Korea have likely become the latest to exploit… 0 FacebookTwitterPinterestEmail
Malware Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT by admin December 8, 2025 by admin December 8, 2025 Cybersecurity researchers are calling attention to a new campaign dubbed JS#SMUGGLER that has been… 0 FacebookTwitterPinterestEmail
Hacking Iranian hackers deploy new MuddyViper spyware against Israel by admin December 3, 2025 by admin December 3, 2025 MuddyWater, an Iran-aligned threat actor, has been targeting critical infrastructure in Israel and Egypt… 0 FacebookTwitterPinterestEmail
Malware North Korean Hackers Deploy 197 npm Packages to Spread Updated OtterCookie Malware by admin November 28, 2025 by admin November 28, 2025 Nov 28, 2025Ravie LakshmananSupply Chain Attack / Malware The North Korean threat actors behind… 0 FacebookTwitterPinterestEmail
Malware Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware by admin November 25, 2025 by admin November 25, 2025 Nov 25, 2025Ravie LakshmananMalware / Browser Security Cybersecurity researchers have disclosed details of a… 0 FacebookTwitterPinterestEmail
Malware EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates by admin November 19, 2025 by admin November 19, 2025 Nov 19, 2025Ravie LakshmananCyber Espionage / Malware The threat actor known as PlushDaemon has… 0 FacebookTwitterPinterestEmail
Malware Dragon Breath Uses RONINGLOADER to Disable Security Tools and Deploy Gh0st RAT by admin November 17, 2025 by admin November 17, 2025 The threat actor known as Dragon Breath has been observed making use of a… 0 FacebookTwitterPinterestEmail
Hacking Hackers Use Hyper-V to Deploy Linux Malware on Windows Systems by admin November 5, 2025 by admin November 5, 2025 The Russian-aligned APT group Curly COMrades are deploying hidden Alpine Linux virtual machines (VMs)… 0 FacebookTwitterPinterestEmail
Malware Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack by admin October 31, 2025 by admin October 31, 2025 Oct 31, 2025Ravie LakshmananMalware / Browser Security A suspected nation-state threat actor has been… 0 FacebookTwitterPinterestEmail
Hacking North Korean Hackers Deploy “Drone” Malware In Targeting Of European UAV Manufacturers by admin October 25, 2025 by admin October 25, 2025 The name said it all: DroneEXEHijackingLoader.dll. That internal file name, buried in malicious code… 0 FacebookTwitterPinterestEmail