February 6, 2025 No Comments SparkCat Malware Uses OCR to Extract Crypto Wallet Recovery Phrases from Images
February 6, 2025 No Comments Cisco Patches Critical ISE Vulnerabilities Enabling Root CmdExec and PrivEsc
February 5, 2025 No Comments Cross-Platform JavaScript Stealer Targets Crypto Wallets in New Lazarus Group Campaign
February 5, 2025 No Comments Silent Lynx Using PowerShell, Golang, and C++ Loaders in Multi-Stage Cyberattacks
February 5, 2025 No Comments Cybercriminals Use Go Resty and Node Fetch in 13 Million Password Spraying Attempts
February 5, 2025 No Comments New Veeam Flaw Allows Arbitrary Code Execution via Man-in-the-Middle Attack
February 5, 2025 No Comments AsyncRAT Campaign Uses Python Payloads and TryCloudflare Tunnels for Stealth Attacks
February 5, 2025 No Comments CISA Adds Four Actively Exploited Vulnerabilities to KEV Catalog, Urges Fixes by Feb 25