Exploits

Alleged India-linked espionage campaign targeted Pakistan, Bangladesh, Sri Lanka

An espionage campaign last year targeted government agencies and critical infrastructure operators in Pakistan, Bangladesh and Sri Lanka, researchers at the cybersecurity firm...

CISA details RESURGE malware exploiting Ivanti Connect Secure vulnerabilities

Threat actors use a fake Ivanti certificate for authentication, which, although unencrypted, can serve as a network signature for detection. 

Chrome Extension Hijacked to Push ClickFix Malware

eSecurity Planet content and product recommendations are editorially independent. We may make money...

Vibe coding service Lovable accused of hosting malware-ridden apps exposing thousands of users — it says they should take more care

(Image credit: Shutterstock) Share this article 0 Join the conversation Follow us Add us as a preferred source on Google Subscribe to our newsletter One Lovable-built app included 6 critical...

Dohdoor Malware Targets U.S. Schools and Healthcare In Multi-Stage Campaign

Researchers at Cisco Talos have uncovered an ongoing cyber campaign delivering a previously undocumented backdoor called Dohdoor. 

APT37 combines cloud storage and USB implants to infiltrate air-gapped systems

Pierluigi Paganini March 02, 2026 North Korean group ScarCruft (aka APT37, Reaper, and Group123) deployed new tools in a campaign dubbed Ruby Jumper, using a...

IBM X-Force reports 44% surge in exploitation of public-facing applications as supply chain and identity attacks intensify

The IBM X-Force Threat Intelligence Index 2026 paints a stark picture of a threat landscape defined less by novelty than by scale, speed and...

RESURGE Malware Remains Active on Ivanti Devices

The latest update on RESURGE malware from Cybersecurity and Infrastructure Security Agency (CISA) signals a concerning reality for network defenders: stealth-focused malware is becoming...

Purchase order attachment isn’t a PDF. It’s phishing for your password

An attachment named New PO 500PCS.pdf.hTM, posing as a purchase order in PDF form, turned out to be something entirely different: a credential-harvesting web page...

Latest articles