Hackers have been found misusing Shellter, a tool originally meant for ethical red teaming, to deliver Stealer malware. The vendor reported that a Shellter Elite ...
By
A recent malware campaign is manipulating search engine results to deliver a loader known as Oyster. Disguised domains mimicking trusted software sources like PuTTY and ...
By
July 6, 2025 — Ingram Micro has confirmed that a ransomware attack was behind the recent service outage that disrupted its operations late last week. ...
By
Taiwanese intelligence agencies have issued warnings about China-developed applications, pointing to serious privacy and security vulnerabilities. A recent probe led by the National Security Bureau, ...
By
Cyber experts have discovered more than 40 malicious browser add-ons for Mozilla Firefox, specifically engineered to steal private keys and seed phrases from cryptocurrency wallets, ...
By
June 30, 2025 — Cisco has released a critical security patch addressing a severe vulnerability identified in its Unified Communications Manager (Unified CM) and the ...
By
Security researchers have flagged a serious vulnerability in a diagnostic tool built by Anthropic, which could put AI developers at risk. The flaw discovered in the ...
By
Microsoft revealed that beginning August 1, 2025, it will gradually remove the password-saving feature from its Authenticator app. The change is part of the company’s ...
By
An investigation by Trustwave SpiderLabs has uncovered a direct connection between the cybercrime group known as Blind Eagle and a Russian hosting provider called Proton66—an ...
By
June 30, 2025 — A newly spotted malware strain appears to be stepping up its game in Ukraine’s digital conflict zone. What started as a ...
By