New AmCache EvilHunter Tool For Detecting Malicious Activities in Windows Systems
AmCache plays a vital role in identifying malicious activities in Windows systems. This tool allows the identification of both benign
Oracle links Clop extortion attacks to July 2025 vulnerabilities
Oracle has linked an ongoing extortion campaign claimed by the Clop ransomware gang to E-Business Suite (EBS) vulnerabilities that were patched
Researchers Warn of Self-Spreading WhatsApp Malware Named SORVEPOTEL
Oct 03, 2025Ravie LakshmananMalware / Online Security Brazilian users have emerged as the target of a new self-propagating malware that
Product Walkthrough: How Passwork 7 Addresses Complexity of Enterprise Security
Passwork is positioned as an on-premises unified platform for both password and secrets management, aiming to address the increasing complexity
Gmail business users can now send encrypted emails to anyone
Google says that Gmail enterprise users can now send end-to-end encrypted emails to people who use any email service or
New “Cavalry Werewolf” Attack Hits Russian Agencies with FoalShell and StallionRAT
Oct 03, 2025Ravie LakshmananCybersecurity / Malware A threat actor that’s known to share overlaps with a hacking group called YoroTrooper
CISA Flags Meteobridge CVE-2025-4008 Flaw as Actively Exploited in the Wild
Oct 03, 2025Ravie LakshmananVulnerability / IoT Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity
Microsoft Outlook stops displaying inline SVG images used in attacks
Microsoft says Outlook for Web and the new Outlook for Windows will no longer display risky inline SVG images that
Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware
Oct 02, 2025Ravie LakshmananMalware / Cyber Espionage The threat actor known as Confucius has been attributed to a new phishing
Automating Pentest Delivery: 7 Key Workflows for Maximum Impact
Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation, it is time
ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More
From unpatched cars to hijacked clouds, this week’s Threatsday headlines remind us of one thing — no corner of technology
Google Mandiant Probes New Oracle Extortion Wave Possibly Linked to Cl0p Ransomware
Oct 02, 2025Ravie LakshmananRansomware / Threat Intelligence Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that they are