The new ransomware groups worrying security researchers in 2025The ransomware ecosystem is increasingly fragmented with new smaller groups emerging alongside traditional mega-groups.
Chinese snoops spotted on end-of-life Juniper routersChinese spies exploited vulnerabilities in Juniper Networks routers to gain root access and deploy backdoors.
CISA Adds Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM to KEV ListCISA added five critical vulnerabilities to its KEV catalog, highlighting active exploitation threats.Immediate patch application required by March 31, 2025, for federal agencies.
Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor VariantsLotus Panda targets various sectors in Asia using the Sagerunex backdoor, demonstrating advanced and persistent threat tactics.
Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and CryptominersISPs in China and the US West Coast are under a coordinated exploitation campaign by unidentified threat actors stealing data and mining cryptocurrencies.
New TgToxic Banking Trojan Variant Evolves with Anti-Analysis UpgradesTgToxic malware continues to evolve, demonstrating the actors' ability to adapt and improve their tactics against cybersecurity efforts.
The new ransomware groups worrying security researchers in 2025The ransomware ecosystem is increasingly fragmented with new smaller groups emerging alongside traditional mega-groups.
Chinese snoops spotted on end-of-life Juniper routersChinese spies exploited vulnerabilities in Juniper Networks routers to gain root access and deploy backdoors.
CISA Adds Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM to KEV ListCISA added five critical vulnerabilities to its KEV catalog, highlighting active exploitation threats.Immediate patch application required by March 31, 2025, for federal agencies.
Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor VariantsLotus Panda targets various sectors in Asia using the Sagerunex backdoor, demonstrating advanced and persistent threat tactics.
Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and CryptominersISPs in China and the US West Coast are under a coordinated exploitation campaign by unidentified threat actors stealing data and mining cryptocurrencies.
New TgToxic Banking Trojan Variant Evolves with Anti-Analysis UpgradesTgToxic malware continues to evolve, demonstrating the actors' ability to adapt and improve their tactics against cybersecurity efforts.
Hybrid Analysis Utilizes Criminal IP's Robust Domain Data For Better Malware Detection | HackerNoonThe partnership strengthens cybersecurity threat intelligence through advanced malware and domain analysis integration.
5 Techniques for Collecting Cyber Threat IntelligenceUnderstanding the current cyber threat landscape is essential for organizations to defend against threats effectively.
4 essential questions to ask about a prospective SIEMThe SIEM market is undergoing significant changes, impacting security tool decisions for many organizations.Effective SIEM solutions are critical amid rising cyber threats and data management challenges.Organizations should focus on essential features like threat intelligence, integration, and analytics in choosing SIEM.
Hybrid Analysis Utilizes Criminal IP's Robust Domain Data For Better Malware Detection | HackerNoonThe partnership strengthens cybersecurity threat intelligence through advanced malware and domain analysis integration.
5 Techniques for Collecting Cyber Threat IntelligenceUnderstanding the current cyber threat landscape is essential for organizations to defend against threats effectively.
4 essential questions to ask about a prospective SIEMThe SIEM market is undergoing significant changes, impacting security tool decisions for many organizations.Effective SIEM solutions are critical amid rising cyber threats and data management challenges.Organizations should focus on essential features like threat intelligence, integration, and analytics in choosing SIEM.