Skip to content
InfosecToday.com
  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
InfosecToday.com
KillSec ransomware targeting healthcare IT systems
Cybersecurity | Data Exfiltration  | Healthcare | Healthcare Security  | Ransomware

KillSec ransomware targeting healthcare IT systems

HiddenGh0st, Winos, and kkRAT using SEO strategies and GitHub pages
Cybersecurity Threats | Malware Distribution | SEO Manipulation 

HiddenGh0st, Winos, and kkRAT using SEO strategies and GitHub pages

Runtime visibility indispensable in cloud-native security
Cloud-Native Security Challenges | Role of AI in Cloud Security  | Runtime Visibility and Prioritization

Runtime visibility indispensable in cloud-native security

Cursor AI Code Editor getting hammered through compromised repositories
AI-Powered Development Tools | Security Vulnerabilities | Supply Chain Risks

Cursor AI Code Editor getting hammered through compromised repositories

Chinese APT group infiltrated Philippine military with EggStreme fileless malware
Cybersecurity Threats | Espionage Techniques  | Malware Frameworks

Chinese APT group infiltrated Philippine military with EggStreme fileless malware

Akira ransomware attackers actively exploiting SonicWall SSL VPN
Attack Mitigation Strategies  | Cybersecurity Vulnerabilities  | Ransomware Threats

Akira ransomware attackers actively exploiting SonicWall SSL VPN

Counterfeit Madgicx Plus and SocialMetrics extensions hijacking Meta business accounts
Data Theft Techniques  | Malvertising Campaigns | Rogue Browser Extensions

Counterfeit Madgicx Plus and SocialMetrics extensions hijacking Meta business accounts

AsyncRAT Takes Advantage of ConnectWise ScreenConnect to Capture Credentials and Cryptocurrency
Cyberattack Techniques | Fileless Malware  | Remote Access Trojans 

AsyncRAT Takes Advantage of ConnectWise ScreenConnect to Capture Credentials and Cryptocurrency

CHILLYHELL macOS Backdoor and ZynorRAT remote access trojan threat to all operating systems
Espionage Threats | macOS Security  | Malware Families

CHILLYHELL macOS Backdoor and ZynorRAT remote access trojan threat to all operating systems

APT41 hackers targeting US trade officials as talks with China approach
Cyber Espionage | Phishing Attacks  | U.S.-China Relations

APT41 hackers targeting US trade officials as talks with China approach

New phishing tool Salty2FA bypasses two-factor authentication
Phishing Techniques  | Targeted Industries | Two-Factor Authentication Bypass 

New phishing tool Salty2FA bypasses two-factor authentication

Cryptojacking attack using TOR infiltrates misconfigured Docker APIs
Cryptojacking | Docker Security | Malware Propagation 

Cryptojacking attack using TOR infiltrates misconfigured Docker APIs

GPUGate malware using Google Ads and counterfeit GitHub commits
Cybersecurity Threats | Malware Campaigns | Social Engineering Techniques 

GPUGate malware using Google Ads and counterfeit GitHub commits

Chinese agents reportedly posed as US congressman to transmit malware
Cyber Espionage | Malware Delivery  | Trade Negotiations 

Chinese agents reportedly posed as US congressman to transmit malware

GitHub workflow breaches impact multiple repositories
Cybersecurity Threats | Data Breaches  | Supply Chain Attacks

GitHub workflow breaches impact multiple repositories

Lazarus Group boosts malware tools with PondRAT, ThemeForestRAT, & RemotePE
Cybersecurity Threats | Malware Types | Social Engineering Attacks 

Lazarus Group boosts malware tools with PondRAT, ThemeForestRAT, & RemotePE

Remote hiring fraud increasing quickly
Hiring Fraud | Identity Deception  | Remote Work Vulnerabilities

Remote hiring fraud increasing quickly

MystRodX backdoor uses DNS and ICMP triggers for covert manipulation
Backdoor Techniques  | Cyber Espionage | Malware

MystRodX backdoor uses DNS and ICMP triggers for covert manipulation

Can AI agents identify threats that your Security Operations Center overlooks?
AI-Driven Network Monitoring | Distributed Security Architecture | Hybrid Threat Detection 

Can AI agents identify threats that your Security Operations Center overlooks?

Iranian cybercriminals compromise over 100 diplomatic email accounts
Cyber Espionage | Geopolitical Tensions | Spear-Phishing Campaigns

Iranian cybercriminals compromise over 100 diplomatic email accounts

BruteForceAI: New AI-powered Github tool
Brute-Force Attack Tools | Ethical Hacking  | Penetration Testing

BruteForceAI: New AI-powered Github tool

Connected vehicles are intelligent, user-friendly, and vulnerable to cyberattack
Consumer Accountability | Cybersecurity Concerns | Vehicle Safety Risks 

Connected vehicles are intelligent, user-friendly, and vulnerable to cyberattack

Fake npm packages stealing Ethereum wallet keys
Cryptocurrency Theft | Malicious Packages | Software Supply Chain Attacks 

Fake npm packages stealing Ethereum wallet keys

North Korean fake job interview schemes
Cyber Threat Intelligence | Cybersecurity Attacks | Infrastructure Vulnerability

North Korean fake job interview schemes

TAG-150 creates CastleRAT using Python and C, broadening the capabilities of CastleLoader malware.
Malware-as-a-Service | Phishing Attacks  | Remote Access Trojans 

TAG-150 creates CastleRAT using Python and C, broadening the capabilities of CastleLoader malware.

Parallel-Poisoned Web Attack presents poisoned web pages to AI web bots
AI Security Threats | Countermeasures for AI Agents  | Malicious Web Attacks

Parallel-Poisoned Web Attack presents poisoned web pages to AI web bots

SAP S/4HANA vulnerability CVE-2025-42957 actively exploited
SAP Software Security  | Vulnerability Management 

SAP S/4HANA vulnerability CVE-2025-42957 actively exploited

AI-driven supply chain attack using model namespace reuse
AI Supply Chain Vulnerabilities | Code Execution Risks  | Malicious Model Deployment

AI-driven supply chain attack using model namespace reuse

Importance of the CVE matrix for cybersecurity
Cyber Insurance  | Software Security  | Vulnerability Management 

Importance of the CVE matrix for cybersecurity

Hidden SVG files launch base64-encoded phishing sites
macOS Security Threats  | Malware Campaigns | Phishing Attacks 

Hidden SVG files launch base64-encoded phishing sites

Page navigation

1 2 3 … 13 Next PageNext

© 2026 InfosecToday.com - WordPress Theme by Kadence WP

  • D3f3ndo
  • Articles
  • Cybersecurity Glossary
  • Contact
  • Login
Search