New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades

27/02/2025 0 Comments 0 tags

Cybersecurity researchers have discovered an updated version of an Android malware called TgToxic (aka ToxicPanda), indicating that the threat actors behind it are continuously making changes in response to public

PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices

27/02/2025 0 Comments 0 tags

A new malware campaign has been observed targeting edge devices from Cisco, ASUS, QNAP, and Synology to rope them into a botnet named PolarEdge since at least the end of

Bybit Hack Traced to Safe{Wallet} Supply Chain Attack Exploited by North Korean Hackers

27/02/2025 0 Comments 0 tags

The U.S. Federal Bureau of Investigation (FBI) formally linked the record-breaking $1.5 billion Bybit hack to North Korean threat actors, as the company’s CEO Ben Zhou declared a “war against

Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites

26/02/2025 0 Comments 0 tags

A cross-site scripting (XSS) vulnerability in a virtual tour framework has been weaponized by malicious actors to inject malicious scripts across hundreds of websites with the goal of manipulating search

CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries

26/02/2025 0 Comments 0 tags

The Computer Emergency Response Team of Ukraine (CERT-UA) on Tuesday warned of renewed activity from an organized criminal group it tracks as UAC-0173 that involves infecting computers with a remote

Malicious PyPI Package “automslc” Enables 104K+ Unauthorized Deezer Music Downloads

26/02/2025 0 Comments 0 tags

Cybersecurity researchers have flagged a malicious Python library on the Python Package Index (PyPI) repository that facilitates unauthorized music downloads from music streaming service Deezer. The package in question is

Three Password Cracking Techniques and How to Defend Against Them

26/02/2025 0 Comments 0 tags

Passwords are rarely appreciated until a security breach occurs; suffice to say, the importance of a strong password becomes clear only when faced with the consequences of a weak one.

Leaked Black Basta Ransomware Chat Logs Reveal Inner Workings and Internal Conflicts

26/02/2025 0 Comments 0 tags

More than a year’s worth of internal chat logs from a ransomware gang known as Black Basta have been published online in a leak that provides unprecedented visibility into their

SOC 3.0 – The Evolution of the SOC and How AI is Empowering Human Talent

26/02/2025 0 Comments 0 tags

Organizations today face relentless cyber attacks, with high-profile breaches hitting the headlines almost daily. Reflecting on a long journey in the security field, it’s clear this isn’t just a human

New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems

26/02/2025 0 Comments 0 tags

Universities and government organizations in North America and Asia have been targeted by a previously undocumented Linux malware called Auto-Color between November and December 2024, according to new findings from