More

    Exploits

    Zero-Day in Sitecore Exploited to Deploy WEEPSTEEL Malware

    A critical zero-day vulnerability (CVE-2025-53690) is being actively exploited in Sitecore. This flaw, originating from old, insecure keys, allows hackers to achieve Remote Code...

    ESET Discovers PromptLock: AI Ransomware Proof-of-Concept from NYU

    In the rapidly evolving world of cybersecurity, a recent discovery has sent ripples through the industry: the emergence of what was initially hailed as...

    MostereRAT Targets Windows Users With Stealth Tactics

    A phishing campaign delivering a new strain of malware, MostereRAT, has been uncovered by cybersecurity researchers. The Remote Access Trojan (RAT) targets Microsoft Windows...

    Remote Access Abuse Biggest Pre-Ransomware Indicator

    Abuses of remote access software and services are the most common ‘pre-ransomware’ indicators, according to new research from Cisco Talos. Adversaries frequently leverage legitimate remote...

    VirusTotal finds hidden malware phishing campaign in SVG files

    VirusTotal has discovered a phishing campaign hidden in SVG files that create convincing portals impersonating Colombia's judicial system that deliver malware. VirusTotal detected this campaign...

    AI-powered malware hit 2,180 GitHub accounts in “s1ngularity” attack

    Investigations into the Nx "s1ngularity" NPM supply chain attack have unveiled a massive fallout, with thousands of account tokens and repository secrets leaked. According to...

    “GPUGate” Malware Abuses Google Ads and GitHub to Deliver Advanced Malware Payload

    A sophisticated malware campaign, dubbed "GPUGate," abuses Google Ads and GitHub's repository structure to trick users into downloading malicious software. 

    AI Coding Tool Used by Coinbase Exposes Firms to Self-Spreading Malware

    A newly disclosed vulnerability in an AI-powered coding tool favored by Coinbase has raised alarms across the cybersecurity communities. 

    Stealerium malware surge prompts concern over new attack tactics

    Proofpoint threat researchers have reported a rise in the use of Stealerium-based malware by opportunistic cybercriminals. Recent analysis by Rob Kinner, Kyle Cucci, and the...

    Latest articles