
Category: Threat Intel Reports
-
New MassJacker clipper targets pirated software seekers
Pirated software seekers are targeted by the new MassJacker clipper malware, according to CyberArk researchers.—————————————————————————————————————A new malware campaign spreading a…
-
Hackers Attacking Exposed Jupyter Notebooks To Deliver Cryptominer
A novel cryptomining campaign has been identified that exploits misconfigured Jupyter Notebooks, targeting both Windows and Linux systems.The attack leverages…
-
AWS SNS Abused To Exfiltrate Data & Phishing Attack
Amazon Web Services Simple Notification Service (AWS SNS) has emerged as a new vector for malicious actors to exfiltrate sensitive…
-
DeepSeek R1 Jailbreaked To Develop Malware, Such As A Keylogger And Ransomware
Cybersecurity researchers have discovered that DeepSeek R1, an open-source large language model, can be manipulated to create functioning malware despite…
-
Cisco IOS XR flaw allows attackers to crash BGP process on routers
Cisco addressed a denial of service (DoS) vulnerability that allows attackers to crash the Border Gateway Protocol (BGP) process on…
-
Top Cybersecurity Tools of 2025 To Managing Remote Device Threats
The rise of remote work has significantly increased the attack surface for cybercriminals, making robust cybersecurity tools more critical than…
-
IRS is evaluating its tech investments and modernization
IRS is evaluating its tech investments and modernization======================================================== Kayla Bartkowski / Getty Images | Get the latest federal technology news…
-
Coinbase phishing email tricks users with fake wallet migration
A large-scale Coinbase phishing attack poses as a mandatory wallet migration, tricking recipients into setting up a new wallet with…
-
SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware
MalwareSocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware=================================================================================Trend Research analyzed SocGholish’s MaaS framework and its role in deploying RansomHub ransomware…
-
Malicious PyPI Packages Stole Cloud Tokens-Over 14,100 Downloads Before Removal
Cybersecurity researchers have warned of a malicious campaign targeting users of the Python Package Index…

