News

Scripting is often seen as something only IT admins do to lengthen their coffee breaks, but home users can benefit from ...
A team of data thieves has doubled down by developing its CastleRAT malware in both Python and C variants. Both versions spread by tricking users into pasting malicious commands through a technique ...
CastleRAT and CastleLoader, active since March 2025, spread malware via phishing and GitHub repos, enabling data theft.
Microsoft Corp will discontinue its Graph command-line interface tool next year, citing declining usage and overlap with existing developer tools as the company consolidates its software development ...
APT28 deploys NotDoor Outlook backdoor via OneDrive DLL side-loading, enabling email-based data theft in NATO firms.
ESET researchers have identified a new threat actor targeting Windows servers with a passive C++ backdoor and a malicious IIS ...
Robocopy is a built-in Windows 11 tool that allows you to copy files from one place to another. It’s a command-line tool, ...
The browser is now the frontline for cyberattacks. From phishing kits and ClickFix lures to malicious OAuth apps and ...
A sophisticated cyber‐espionage operation is exploiting Windows shortcut files disguised alongside seemingly genuine PDF newsletters to surreptiti ...
AttackIQ has updated the assessment template that emulates the various post-compromise Tactics, Techniques, and Procedures ...
This week, El Salvador split its bitcoin reserve, an Indian court jailed cops for crypto kidnapping, a PowerShell-based ...
A newly identified hacking group named GhostRedirector has compromised 65 Windows servers using previously unknown tools ...