Malicious Go Modules Deliver Disk-Wiping Linux Malware in Advanced Supply Chain Attack

03/05/2025 0 Comments 0 tags

Cybersecurity researchers have discovered three malicious Go modules that include obfuscated code to fetch next-stage payloads that can irrevocably overwrite a Linux system’s primary disk and render it unbootable. The

Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware

03/05/2025 0 Comments 0 tags

An Iranian state-sponsored threat group has been attributed to a long-term cyber intrusion aimed at a critical national infrastructure (CNI) in the Middle East that lasted nearly two years. The

U.S. Charges Yemeni Hacker Behind Black Kingdom Ransomware Targeting 1,500 Systems

03/05/2025 0 Comments 0 tags

The U.S. Department of Justice (DoJ) on Thursday announced charges against a 36-year-old Yemeni national for allegedly deploying the Black Kingdom ransomware against global targets, including businesses, schools, and hospitals

TikTok Slammed With €530 Million GDPR Fine for Sending E.U. Data to China

02/05/2025 0 Comments 0 tags

Ireland’s Data Protection Commission (DPC) on Tuesday fined popular video-sharing platform TikTok €530 million ($601 million) for infringing data protection regulations in the region by transferring European users’ data to

How to Automate CVE and Vulnerability Advisory Response with Tines

02/05/2025 0 Comments 0 tags

Run by the team at workflow orchestration and AI platform Tines, the Tines library features pre-built workflows shared by security practitioners from across the community – all free to import

MintsLoader Drops GhostWeaver via Phishing, ClickFix — Uses DGA, TLS for Stealth Attacks

02/05/2025 0 Comments 0 tags

The malware loader known as MintsLoader has been used to deliver a PowerShell-based remote access trojan called GhostWeaver. “MintsLoader operates through a multi-stage infection chain involving obfuscated JavaScript and PowerShell

Microsoft Sets Passkeys Default for New Accounts; 15 Billion Users Gain Passwordless Support

02/05/2025 0 Comments 0 tags

A year after Microsoft announced passkeys support for consumer accounts, the tech giant has announced a big change that pushes individuals signing up for new accounts to use the phishing-resistant

Fake Security Plugin on WordPress Enables Remote Admin Access for Attackers

01/05/2025 0 Comments 0 tags

Cybersecurity researchers have shed light on a new campaign targeting WordPress sites that disguises the malware as a security plugin. The plugin, which goes by the name “WP-antymalwary-bot.php,” comes with

Why top SOC teams are shifting to Network Detection and Response

01/05/2025 0 Comments 0 tags

Security Operations Center (SOC) teams are facing a fundamentally new challenge — traditional cybersecurity tools are failing to detect advanced adversaries who have become experts at evading endpoint-based defenses and

Claude AI Exploited to Operate 100+ Fake Political Personas in Global Influence Campaign

01/05/2025 0 Comments 0 tags

Artificial intelligence (AI) company Anthropic has revealed that unknown threat actors leveraged its Claude chatbot for an “influence-as-a-service” operation to engage with authentic accounts across Facebook and X. The sophisticated