May 20, 2025Ravie LakshmananCredential Theft / Browser Security An unknown threat actor has been attributed to creating...
May 20, 2025Ravie LakshmananMalware / Cyber Espionage High-level government institutions in Sri Lanka, Bangladesh, and Pakistan have...
Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that...
May 20, 2025The Hacker NewsPenetration Testing / Risk Management In the newly released 2025 State of Pentesting...
May 20, 2025Ravie LakshmananMalware / Cyber Espionage Threat hunters have exposed the tactics of a China-aligned threat...
May 20, 2025Ravie LakshmananLinux / Cryptojacking Cybersecurity researchers are calling attention to a new Linux cryptojacking campaign...
Cybersecurity researchers have uncovered malicious packages uploaded to the Python Package Index (PyPI) repository that act as...
May 19, 2025Ravie LakshmananMalware / Supply Chain Attack The official site for RVTools has been hacked to...
May 19, 2025Ravie LakshmananRansomware / Malware Several ransomware actors are using a malware called Skitnet as part...
Continuous Threat Exposure Management (CTEM) has moved from concept to cornerstone, solidifying its role as a strategic...