Browsing: #Cybersecurity
Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that enabled cybercriminals to conduct large-scale man-in-the-middle (AitM) credential harvesting attacks,…
Ravi LakshmananMarch 5, 2026Malware/Dark Web A joint law enforcement operation dismantled LeakBase, one of the world’s largest online forums where…
Cybersecurity researchers have warned of a surge in retaliatory hacktivist activity in the wake of the joint US-Israeli military operations…
Google announced that it has identified a “new and powerful” exploit kit called Coruna (also known as CryptoWaters) targeting Apple…
hacker newsMarch 4, 2026Artificial Intelligence / SaaS Security As AI becomes the central engine of enterprise productivity, security leaders are…
Ravi LakshmananMarch 4, 2026Threat Intelligence/Application Security Cybersecurity researchers have flagged a malicious Packagist PHP package masquerading as a Laravel utility…
Ravi LakshmananMarch 4, 2026Malware / Windows Security Cybersecurity researchers have revealed details of an advanced persistent threat (APT) group called…
Ravi LakshmananMarch 4, 2026Vulnerabilities / Enterprise Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently…
Threat hunters are cautioned as part of a new campaign in which malicious actors pose as fake IT support and…
Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real…