More

    Exploits

    CISA warns of malware exploiting Ivanti Endpoint Manager Mobile

    The two sets of malware CISA identified let attackers achieve RCE on a compromised server. 

    News brief: KillSec, Yurei score successful ransomware attacks

    kras99 - stock.adobe.com Check out the latest security news from the Informa TechTarget team. By Published: 19 Sep 2025 Ransomware gangs and strains come and go, and some...

    CISA: Attacker exploited Ivanti bugs, dropped snoopy malware

    An unknown attacker has abused a couple of flaws in Ivanti Endpoint Manager Mobile (EPMM) and deployed two sets of malware against an unnamed...

    Ransomware attack closed South Lyon Schools for 3 days, officials confirm

    Superintendent Steve Archibald confirmed a ransomware attack "by a well-known group" caused the closure of the district for three days this week. 

    Wormable Malware Hits npm Supply Chain

    Wormable Malware Hits npm Supply Chain | Datamation Security A fast-spreading malware campaign has compromised npm packages, stealing secrets...

    CISA exposes malware kits deployed in Ivanti EPMM attacks

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published an analysis of the malware deployed in attacks exploiting vulnerabilities affecting Ivanti Endpoint Manager...

    Russian State Hackers Collaborate in Attacks Against Ukraine

    Two Russian state-linked threat actors, Gamaredon and Turla, are working together to compromise high-value defense targets in Ukraine, according to a new report by...

    Novel multi-version CountLoader malware loader advances Russian ransomware

    Malicious payloads, such as Cobalt Strike, AdaptixC2, and the PureHVNC RAT, have been deployed by Russian ransomware operations through three different versions of the...

    New Gold Salem ransomware could be the most worrying new strain we’ve seen for a while

    (Image credit: Getty Images) Warlock ransomware group compromised over 60 victims since emerging in March 2025 Sophos highlights advanced tactics including SharePoint exploits, tunneling, and credential...

    Latest articles