Cryptojacking Campaign Exploits Driver to Boost Monero Mining
Cryptojacking campaign used pirated software to deploy a persistent XMRig miner with stealth tactics
Aggregating 3827 articles from trusted cybersecurity sources
Cryptojacking campaign used pirated software to deploy a persistent XMRig miner with stealth tactics
AIs like Grok and Microsoft Copilot can be exploited as covert C2 channels for malware communication
Two popular AES libraries, aes-js and pyaes, “helpfully” provide a default IV in their AES-CTR API, leading to a large number of key/IV reuse bugs. These bug...
Searchlight Cyber reports a 30% annual increase in ransomware victim numbers in 2025
Police in The Netherlands say they have arrested a 40-year-old man on suspicion of hacking..
Mandiant reveals campaign featuring exploit of a CVSS 10.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit t...
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Autodesk AutoCAD. User interaction is required to exploit t...
GrayCharlie turns compromised WordPress sites into malware delivery machines. Discover how this threat actor chains fake browser updates and ClickFix lures t...
This article walks through how Elastic Security's Attack Discovery, combined with Workflows and Agent Builder, can automatically detect, correlate, and confi...
SentinelOne secures AI from infrastructure to agents, delivering visibility, governance, and control at scale.
Android 17 Beta introduces privacy, security updates and a new Canary channel for improved development
Cloud development platform Vercel has disclosed a security incident after threat actors claimed to have breached its systems and are attempting to sell stole...
Major U.S.
Ignoring a real breach notification invites risk, but falling for a bogus one could be even worse. Stop reacting on autopilot.
Threat actors are exploiting three recently disclosed Windows security vulnerabilities in attacks aimed at gaining SYSTEM or elevated administrator permissio...
A ransomware attack on Cookeville Regional Medical Center hospital (Tennessee) exposed data of 337,000 people after hackers stole 500GB of sensitive informat...
Cybernews reports that leading global luxury apparel retail firms Lacoste, Ralph Lauren, Canada Goose, and Carter's were claimed to have had their "supply ch...
Tennessee's CRMC notifies over 337,000 patients of Rhysida ransomware breach exposing sensitive data
Cookeville Regional Medical Center was targeted last year by the Rhysida ransomware group, which stole 500GB of data. The post Data Breach at Tennessee Hospi...
The ShinyHunters extortion group has leaked data from 13.5 million McGraw Hill user accounts, stolen after breaching the company's Salesforce environment ear...
A hacking group claims to have broken into the flood defence system protecting Venice's Piazza San Marco - and is offering to sell access to whoever wants it...
Major U.S.
Hacking group ShinyHunters has listed the National Railroad Passenger Corporation on its data leak site, claiming to have stolen 9.4 million records containi...