Vendor access is one of the most overlooked and abused entry points in modern environments. Third party vendors, contractors, service providers, and partners often need privileged access to critical ...
What makes the threat notable is the way it narrows the gap between a traditional RAT and an infostealer. Analysts found that STX RAT can give operators covert control of a victim machine through a ...
This week, German police unmasked a REvil leader, a critical Docker flaw, Medusa ransomware surged, DPRK hackers abused ...
STX RAT, a newly identified remote access trojan, attempted deployment in finance, showing advanced C2 and stealthy delivery ...
Iran-linked actors target U.S. PLCs using Dropbear and SSH access, disrupting OT systems across sectors and escalating cyber ...
The Medusa ransomware group is operating at a fast pace by leveraging zero-days and quickly exploiting new bugs and breached ...
The financially motivated cybercriminal threat actor Storm-1175 operates high-velocity ransomware campaigns that weaponize ...
GitHub has been drawn into another cyber threat case after researchers uncovered a multi-stage malware campaign using ...
On March 31, 2026, the popular HTTP client Axios experienced a supply chain attack, causing two newly published npm packages ...
A North Korea-nexus threat actor compromised the widely used axios npm package, delivering a cross-platform remote access ...