Vulnerability ShadowPad Malware Actively Exploits WSUS Vulnerability for Full System Access by admin November 24, 2025 by admin November 24, 2025 Nov 24, 2025Ravie LakshmananMalware / Vulnerability A recently patched security flaw in Microsoft Windows… 0 FacebookTwitterPinterestEmail
Hacking Sturnus Android malware spies on encrypted Signal, WhatsApp chats by admin November 22, 2025 by admin November 22, 2025 A newly discovered Android banking trojan named Sturnus can bypass the encryption protections of… 0 FacebookTwitterPinterestEmail
Malware Iranian Hackers Use DEEPROOT and TWOSTROKE Malware in Aerospace and Defense Attacks by admin November 22, 2025 by admin November 22, 2025 Nov 18, 2025Ravie LakshmananCyber Espionage / Malware Suspected espionage-driven threat actors from Iran have… 0 FacebookTwitterPinterestEmail
Hacking Android Malware Records Encrypted Messages, Hijacks Devices by admin November 21, 2025 by admin November 21, 2025 Security researchers have identified a new Android banking trojan that does much more than… 0 FacebookTwitterPinterestEmail
PhishingSecurity ToddyCat APT’s new tools and techniques by admin November 21, 2025 by admin November 21, 2025 Introduction Email remains the main means of business correspondence at organizations. It can be… 0 FacebookTwitterPinterestEmail
Malware 0-Days, LinkedIn Spies, Crypto Crimes, IoT Flaws and New Malware Waves by admin November 20, 2025 by admin November 20, 2025 Nov 20, 2025Ravie LakshmananCybersecurity / Hacking News This week has been crazy in the… 0 FacebookTwitterPinterestEmail
PhishingSecurity The Tsundere botnet uses the Ethereum blockchain to infect its targets by admin November 20, 2025 by admin November 20, 2025 Introduction Tsundere is a new botnet, discovered by our Kaspersky GReAT around mid-2025. We… 0 FacebookTwitterPinterestEmail
Malware TamperedChef Malware Spreads via Fake Software Installers in Ongoing Global Campaign by admin November 20, 2025 by admin November 20, 2025 Nov 20, 2025Ravie LakshmananMalvertising / Artificial Intelligence Threat actors are leveraging bogus installers masquerading… 0 FacebookTwitterPinterestEmail
Hacking Router implant ‘EdgeStepper’ hijacks software updates to deliver malware by admin November 20, 2025 by admin November 20, 2025 ESET researchers have uncovered a new adversary-in-the-middle (AitM) tool used by the China-linked APT… 0 FacebookTwitterPinterestEmail
PhishingSecurity Desktop and IoT malware report for Q3 2025 by admin November 19, 2025 by admin November 19, 2025 IT threat evolution in Q3 2025. Mobile statisticsIT threat evolution in Q3 2025. Non-mobile statistics Quarterly… 0 FacebookTwitterPinterestEmail