CISA open-sources Thorium platform for malware, forensic analysis

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) today announced the public availability of Thorium, an…

Microsoft: Russian hackers use ISP access to hack embassies in AiTM attacks

Microsoft warns that a cyber-espionage group linked to Russia’s Federal Security Service (FSB) is targeting diplomatic…

Inside a Real Clickfix Attack: How This Social Engineering Hack Unfolds

An inside look at a ClickFix campaign and a real-world attack, its next iteration (FileFix), and…

Spikes in malicious activity precede new security flaws in 80% of cases

Researchers have found that in roughly 80% of cases, spikes in malicious activity like network reconnaissance,…

Proton launches free standalone cross-platform Authenticator app

Proton has launched Proton Authenticator, a free standalone two-factor authentication (2FA) application for Windows, macOS, Linux, Android,…

Critical RCE Flaw in WordPress ‘Alone’ Theme Under Mass Exploitation | Black Hat Ethical Hacking

Threat actors are actively exploiting a critical vulnerability in the WordPress theme “Alone”, enabling unauthenticated remote…

ShinyHunters behind Salesforce data theft attacks at Qantas, Allianz Life, and LVMH

A wave of data breaches impacting companies like Qantas, Allianz Life, LVMH, and Adidas has been…

Hackers target Python devs in phishing attacks using fake PyPI site

The Python Software Foundation warned users this week that threat actors are trying to steal their…

SafePay ransomware threatens to leak 3.5TB of Ingram Micro data

The SafePay ransomware gang is threatening to leak 3.5TB of data belonging to IT giant Ingram…

Hackers actively exploit critical RCE in WordPress Alone theme

Threat actors are actively exploiting a critical unauthenticated arbitrary file upload vulnerability in the WordPress theme…