Thai Police Systems Under Fire From ‘Yokai’ Backdoor
Hackers are abusing legitimate Windows utilities to target Thai law enforcement with a novel malware that is a mix of…
Hackers are abusing legitimate Windows utilities to target Thai law enforcement with a novel malware that is a mix of…
The Clop ransomware gang has confirmed to BleepingComputer that they are behind the recent Cleo data-theft attacks, utilizing zero-day exploits…
The Chinese Winnti hacking group is using a new PHP backdoor named 'Glutton' in attacks on organizations in China and…
A threat actor tracked as MUT-1244 has stolen over 390,000 WordPress credentials in a large-scale, year-long campaign targeting other threat…
Defenders running the Cleo managed file transfer are urged to be on the lookout for the Cleopatra backdoor and other…
Hackers are exploiting a critical vulnerability in the "Hunk Companion" plugin to install and activate other plugins with exploitable flaws directly…
Infiltrating other nations' telecom networks is a cornerstone of China's geopolitical strategy, and it's having the unintended consequence of driving…
Radiant Capital now says that North Korean threat actors are behind the $50 million cryptocurrency heist that occurred after hackers…
Cloudflare Tunnels is just the latest legitimate cloud service that cybercriminals and state-sponsored threat actors are abusing to hide their…
Threat actors are using public exploits for a critical authentication bypass flaw in ProjectSend to upload webshells and gain remote…