HellCat and Morpheus ransomware share identical code, relying on the Windows Cryptographic API for encryption.
A third vulnerability patched by Cisco is CVE-2025-20128 (CVSS score: 5.3), an integer underflow bug impacting the Object ...
The BC malware has also been the subject of an independent analysis by Sophos, which attributed the artifacts to a threat ...
New research by web exposure management specialist Reflectiz reveals several alarming findings about the high number of ...
Google identifies TRIPLESTRENGTH targeting cloud platforms like AWS and Azure for cryptojacking and ransomware.
Fake CAPTCHA checks are spreading Lumma Stealer malware worldwide, targeting telecom, healthcare, and banking sectors ...
Rare malware targets Juniper routers in the J-magic campaign, exploiting JunoOS and impacting industries like IT, energy, and manufacturing.
Seven vulnerabilities, including BootHole and PixieFail, in Palo Alto firewalls risk Secure Boot integrity and enable sophisticated attacks.
PlushDaemon APT targets South Korean VPN with SlowStepper backdoor. Multistage DNS C&C protocol aids espionage.
"Customers are strongly advised to apply the January 2025 Critical Patch Update for Oracle Agile PLM Framework as it includes ...
Threat actors are exploiting an unspecified zero-day vulnerability in Cambium Networks cnPilot routers to deploy a variant of ...
Discover security risks in your browsing and SaaS environment with a free assessment. Get metrics, insights, and ...