DPRK-linked actors use GitHub C2 and LNK phishing in South Korea, enabling persistent PowerShell control and data ...
The multi-stage campaign targeting South Korea uses weaponized Windows shortcuts and GitHub-based command and control to ...
This week, German police unmasked a REvil leader, a critical Docker flaw, Medusa ransomware surged, DPRK hackers abused ...
A digitally signed adware tool has deployed payloads running with SYSTEM privileges that disabled antivirus protections on ...
CERT-UA links the AgingFly credential-stealing campaign to phishing, browser theft, and modular remote access.
A new malware family named 'AgingFly' has been identified in attacks against local governments and hospitals that steal ...
Cargo-stealing hackers have a new trick up their sleeve: using a third-party code-signing service makes their remote ...
The Medusa ransomware group is operating at a fast pace by leveraging zero-days and quickly exploiting new bugs and breached ...
AttackIQ has released a new attack graph that emulates the behaviors of NightSpire Ransomware, a financially motivated ...
AtlasCross RAT spreads via 11 fake domains registered October 27, 2025, enabling encrypted C2 control and persistence.
As enterprises rely more heavily on AI technologies and services, attackers’ living-off-the-land techniques have evolved to ...
Companies revolutionizing MSPs and the IT channel with automation and agents include CRN 2026 AI 100 list makers ServiceNow, ...