Hacker
-
8Base ransomware claims to have stolen Volkswagen data—learn about the allegations, company's response, and tips for supply chain security to avoid similar breaches.
-
DefenderWrite exploits whitelisted Windows programs to drop malware in AV folders—learn about its method, testing, and defenses like auditing whitelisting to protect against persistence threats.
-
Posted: October 18, 2025Views: 13WaterPlum's Cluster B deploys OtterCandy via ClickFake campaigns—learn about its theft features, v2 updates, and defenses like monitoring Node.js to protect against credential and crypto theft.
-
UNC5342 uses EtherHiding to embed malware in smart contracts for credential theft—learn to spot fake jobs, restrict downloads, and bolster defenses against these evolving cyber attacks.
-
UNC5142 exploits WordPress via BNB Smart Chain to spread stealers like Atomic—learn to update sites, use antivirus, and detect anomalies to protect against these evolving cyber attacks.
-
Trend Micro exposes "Zero Disco" attacks exploiting CVE-2025-20352 for rootkit deployment on Cisco devices—learn quick fixes like patching and EDR to safeguard against remote code execution and data theft risks.
-
APT group Mysterious Elephant exploits WhatsApp with custom malware for data theft—learn to patch vulnerabilities, monitor networks, and train against phishing to protect from these evolving cyber attacks.
-
CISA warns of CVE-2025-54253 in Adobe Experience Manager, allowing unauthenticated code execution—fix now for versions up to 6.5.23.0. Also, active CVE-2016-7836 in SKYSEA; learn how to secure your systems from these critical vulnerabilities.
-
New research reveals Telegram as the primary tool for 120+ hacktivist groups to plan DDoS strikes via 11,000 posts and hashtags-exposing worldwide targets. Learn to monitor threats, bolster DDoS defenses, and stay ahead of visible cyber tactics.
-
Posted: October 14, 2025Views: 23Researcher exposes vulnerability in Worldline Yomani XR's debug port, allowing instant root shell access for malware or network pivots—despite tamper protections. Merchants must patch firmware and audit devices to block this high-risk entry point.