#threat-intelligence

[ follow ]
#cybersecurity
Information security
fromITPro
3 months ago

The new ransomware groups worrying security researchers in 2025

The ransomware ecosystem is increasingly fragmented with new smaller groups emerging alongside traditional mega-groups.
Information security
fromThe Hacker News
2 months ago

CISA Adds Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM to KEV List

CISA added five critical vulnerabilities to its KEV catalog, highlighting active exploitation threats.
Immediate patch application required by March 31, 2025, for federal agencies.
Growth hacking
fromThe Hacker News
2 months ago

Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants

Lotus Panda targets various sectors in Asia using the Sagerunex backdoor, demonstrating advanced and persistent threat tactics.
Tech industry
fromThe Hacker News
2 months ago

Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers

ISPs in China and the US West Coast are under a coordinated exploitation campaign by unidentified threat actors stealing data and mining cryptocurrencies.
Information security
fromThe Hacker News
2 months ago

New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades

TgToxic malware continues to evolve, demonstrating the actors' ability to adapt and improve their tactics against cybersecurity efforts.
Information security
fromITPro
3 months ago

The new ransomware groups worrying security researchers in 2025

The ransomware ecosystem is increasingly fragmented with new smaller groups emerging alongside traditional mega-groups.
Information security
fromThe Hacker News
2 months ago

CISA Adds Five Actively Exploited Vulnerabilities in Advantive VeraCore and Ivanti EPM to KEV List

CISA added five critical vulnerabilities to its KEV catalog, highlighting active exploitation threats.
Immediate patch application required by March 31, 2025, for federal agencies.
Growth hacking
fromThe Hacker News
2 months ago

Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants

Lotus Panda targets various sectors in Asia using the Sagerunex backdoor, demonstrating advanced and persistent threat tactics.
Tech industry
fromThe Hacker News
2 months ago

Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers

ISPs in China and the US West Coast are under a coordinated exploitation campaign by unidentified threat actors stealing data and mining cryptocurrencies.
Information security
fromThe Hacker News
2 months ago

New TgToxic Banking Trojan Variant Evolves with Anti-Analysis Upgrades

TgToxic malware continues to evolve, demonstrating the actors' ability to adapt and improve their tactics against cybersecurity efforts.
Node JS
fromBleepingComputer
4 days ago

Dozens of malicious packages on NPM collect host and network data

60 malicious NPM packages were found that collect sensitive data and send it to threat actors through Discord webhooks.
Threat actors employed names similar to legitimate packages to deceive developers and infiltrate systems.
[ Load more ]