Sitemap
Pages
Posts by category
- Category: Cybercrime
- Category: Carding
- Category: Darkweb
- Dream Market Vendor “Rackjaw2” Sentenced to Prison
- Feds Traced Bitcoin Transactions to a Drug Dealer’s Apartment
- Australian Man Sentenced for Selling Ecstasy on the Darkweb
- Brave Browser Leaked DNS Queries for Onion Services
- Australian Border Force Seizes Meth Inside a Stuffed Llama
- New Change to German Postal Law Targets Internet Drug Trade
- Category: Fraud
- Category: The Deep Web
- Category: Hackers
- Category: Breaches
- PhantomCore Exploits TrueConf Vulnerabilities to Breach Russian Networks
- Authorities Claim LockBit Admin “LockBitSupp” Has Engaged with Law Enforcement
- CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline
- UNC6692 Impersonates IT Help Desk via Microsoft Teams to Deploy SNOW Malware
- No Exploit Needed: How Attackers Walk Through the Front Door via Identity-Based Attacks
- Ransomware Negotiator Pleads Guilty to Aiding BlackCat Attacks in 2023
- $13.74M Hack Shuts Down Sanctioned Grinex Exchange After Intelligence Claims
- ThreatsDay Bulletin: Defender 0-Day, SonicWall Brute-Force, 17-Year-Old Excel RCE and 15 More Stories
- ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories
- ThreatsDay Bulletin: Hybrid P2P Botnet, 13-Year-Old Apache RCE and 18 More Stories
- ThreatsDay Bulletin: Pre-Auth Chains, Android Rootkits, CloudTrail Evasion & 10 More Stories
- Russian CTRL Toolkit Delivered via Malicious LNK Files Hijacks RDP via FRP Tunnels
- DeepLoad Malware Uses ClickFix and WMI Persistence to Steal Browser Credentials
- Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware
- TeamPCP Pushes Malicious Telnyx Versions to PyPI, Hides Stealer in WAV Files
- ThreatsDay Bulletin: PQC Push, AI Vuln Hunting, Pirated Traps, Phishing Kits & 20 More Stories
- Tax Search Ads Deliver ScreenConnect Malware Using Huawei Driver to Disable EDR
- 54 EDR Killers Use BYOVD to Exploit 35 Signed Vulnerable Drivers and Disable Security
- CISA Warns of Zimbra, SharePoint Flaw Exploits; Cisco Zero-Day Hit in Ransomware Attacks
- ThreatsDay Bulletin: FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More
- INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime
- ThreatsDay Bulletin: OAuth Trap, EDR Killer, Signal Phishing, Zombie ZIP, AI Platform Hack & More
- CISA Flags SolarWinds, Ivanti, and Workspace One Vulnerabilities as Actively Exploited
- ThreatsDay Bulletin: DDR5 Bot Scalping, Samsung TV Tracking, Reddit Privacy Fine & More
- Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
- Trojanized Gaming Tools Spread Java-Based RAT via Browser and Chat Platforms
- Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
- Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity
- AI-Assisted Threat Actor Compromises 600+ FortiGate Devices in 55 Countries
- Identity Cyber Scores: The New Metric Shaping Cyber Insurance in 2026
- ClickFix Campaign Abuses Compromised Sites to Deploy MIMICRAT Malware
- BeyondTrust Flaw Used for Web Shells, Backdoors, and Data Exfiltration
- ThreatsDay Bulletin: AI Prompt RCE, Claude 0-Click, RenEngine Loader, Auto 0-Days & 25+ Stories
- Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server
- Reynolds Ransomware Embeds BYOVD Driver to Disable EDR Security Tools
- Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity
- TeamPCP Worm Exploits Cloud Infrastructure to Build Criminal Infrastructure
- Bloody Wolf Targets Uzbekistan, Russia Using NetSupport RAT in Spear-Phishing Campaign
- Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity
- ThreatsDay Bulletin: Codespaces RCE, AsyncRAT C2, BYOVD Abuse, AI Cloud Intrusions & 15+ Stories
- Category: Phishing
- Category: Breaches
- Category: Malware
- Category: Malware Analysis
- IcedID Malware Updates new techniques To Avoid Detection
- New Info Stealer Poulight From The Russian Underground
- Chinese government hackers attack Russian companies for the first time
- Rare UEFI Malware Found in the wild Kaspersky says
- How the Trickbot C2 uses rDNS to disguise as a legitimate Australian government service
- Category: Threats
- Ghostwriter Update: Cyber Espionage Group UNC1151 Likely Conducts Ghostwriter Influence Activity
- Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise
- Forced Chrome extensions get removed, keep reappearing
- ASyncRat surpasses Dridex, TrickBot and Emotet to become dominant email threat
- Credential-stealing malware disguises itself as Telegram, targets social media users
- Don’t let scammers ruin your Valentine’s Day
- SolarWinds attackers launch new campaign
- Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise
- The UNC2529 Triple Double: A Trifecta Phishing Campaign
- UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat
- Abusing Replication: Stealing AD FS Secrets Over the Network
- Category: Malware Analysis
- Category: Security
- Category: Cloud Security
- Software Composition Analysis (SCA): How Does It Help Keep Cloud Applications Secure?
- Web Application Firewalls (WAFs): What You Need To Know About the Security Checkpoint for Your Web Application
- Building the Business Case for DevSecOps
- What is Infrastructure as Code? The Best Way to Fully Control Your Cloud Configuration
- Crawl, Walk, Run: Operationalizing Your IaC Security Program
- How To Prevent the IaC Misconfiguration Snowball Effect
- Prevent Secret Leaks: Find and Secure Secrets Across Your Repositories and Pipelines
- You Must Comply! Why You Need Proactive Open-Source License Compliance
- Infrastructure as Code Security and AppSec: Streamlined DevSecOps From App to Infra
- Prisma Cloud Provides New Extensive Use Cases for Azure Customers
- Category: IoT
- New P2P Botnet Targeting IoT Devices
- IoT Security, Attacks And The Industrial Systems at Risk
- A Roadmap to Secure Connected Cars: Charting the WP.29’s UN Regulation No. 155
- The Transition to 5G: Security Implications of Campus Networks
- Lost in Translation
- The Cybersecurity Blind Spots of Connected Cars
- Category: Mobile
- Google is indexing the phone numbers of WhatsApp Users
- Chinese authorities monitor content of WeChat users registered outside China
- Google removes 16 malicious apps from play store found to be part of the Joker malware family
- WhatsApp can be forced to decrypt WhatsApp Google Drive backups by state surveillance
- Vulnerabilities in old GTP protocol could affect 4G and 5G networks
- Category: Threat Intelligence
- Microsoft to Block Excel Add-ins to Stop Office Exploits
- ‘DragonSpark’ Malware: East Asian Cyberattackers Create an OSS Frankenstein
- Pair of Galaxy App Store Bugs Offer Cyberattackers Mobile Device Access
- Hunting Insider Threats on the Dark Web
- FanDuel Sportsbook Bettors Exposed in Mailchimp Breach
- Ransomware Profits Decline as Victims Dig In, Refuse to Pay
- Attackers Crafted Custom Malware for Fortinet Zero-Day
- Cybercriminals Target Telecom Provider Networks
- Name That Toon: Poker Hand
- New Coalfire Report Reveals CISOs Rising Influence
- ChatGPT Could Create Polymorphic Malware Wave, Researchers Warn
- Initial Access Broker Market Booms, Posing Growing Threat to Enterprises
- Category: Web Applications
- Category: Cloud Security