
Blog
-
Does agency messaging blaming Democrats for government shutdown violate the Hatch Act?
Does agency messaging blaming Democrats for government shutdown violate the Hatch Act?======================================================================================* [Website Malware Infections](https://blog.sucuri.net/category/website-malware-infections)* [WordPress Security](https://blog.sucuri.net/category/wordpress-security)Malvertising Campaign Hides in Plain Sight on WordPress Websites================================================================ [Puja Srivastava](https://blog.sucuri.net/author/puja-srivastava)* October 3,…
-
Discord Data Breach – Customers Personal Data and Scanned Photo IDs leaked
A data breach at a third-party customer service provider has exposed the personal data of some Discord users, including names,…
-
Artists&Clients – 95,351 breached accounts
In response to evolving concerns around copyright, data ownership, and the ethical use of AI, we are updating how we…
-
Oracle links extortion campaign to bugs addressed in July patch
Image: Christian Wiediger / Unsplash [Jonathan Greig](/author/jonathan-greig)October 3rd, 2025 Oracle links extortion campaign to bugs addressed in July patch===============================================================Software giant…
-
Salesforce providing support to customers listed on Scattered Spider extortion site
Image: Unsplash [Jonathan Greig](/author/jonathan-greig)October 3rd, 2025 Salesforce providing support to customers listed on Scattered Spider extortion site===================================================================================Salesforce said it is…
-
ShinyHunters Launches Data Leak Site: Trinity of Chaos Announces New Ransomware Victims
Trinity of Chaos, tied to Lapsus$, Scattered Spider -& ShinyHunters, hit 39 firms via Salesforce flaws, launching a TOR data…
-
Rhadamanthys 0.9.x walk through the updates
Rhadamanthys, a complex multi-modular stealer, has released version 0.9.2 with significant updates. The malware now uses PNG files to deliver…
-
DeceptiveDevelopment: From primitive crypto theft to sophisticated AIbased deception
This analysis delves into the operations of DeceptiveDevelopment, a North Korea-aligned threat actor, and its connections to North Korean IT…

