Skip to content
cyber attacks Page 132

cyber attacks

China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access

China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access

Mar 05, 2025Ravie LakshmananNetwork Security / Data Breach The China-linked threat actor behind the zero-day exploitation of security flaws in Microsoft Exchange servers in January 2021 has shifted its tactics to target the information technology… 

Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America

Dark Caracal Uses Poco RAT to Target Spanish-Speaking Enterprises in Latin America

Mar 05, 2025Ravie LakshmananCyber Espionage / Malware The threat actor known as Dark Caracal has been attributed to a campaign that deployed a remote access trojan called Poco RAT in attacks targeting Spanish-speaking targets in… 

Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud

Google Rolls Out AI Scam Detection for Android to Combat Conversational Fraud

Mar 05, 2025Ravie LakshmananMobile Security / Artificial Intelligence Google has announced the rollout of artificial intelligence (AI)-powered scam detection features to secure Android device users and their personal information. “These features specifically target conversational scams,… 

Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants

Chinese APT Lotus Panda Targets Governments With New Sagerunex Backdoor Variants

Mar 05, 2025Ravie LakshmananCyber Espionage / Network Security The threat actor known as Lotus Panda has been observed targeting government, manufacturing, telecommunications, and media sectors in the Philippines, Vietnam, Hong Kong, and Taiwan with updated… 

Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems

Seven Malicious Go Packages Found Deploying Malware on Linux and macOS Systems

Mar 05, 2025Ravie LakshmananOpen Source / Malware Cybersecurity researchers are alerting of an ongoing malicious campaign targeting the Go ecosystem with typosquatted modules that are designed to deploy loader malware on Linux and Apple macOS… 

Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates

Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates

Mar 04, 2025Ravie LakshmananCybercrime / Threat Intelligence Threat actors deploying the Black Basta and CACTUS ransomware families have been found to rely on the same BackConnect (BC) module for maintaining persistent control over infected hosts,… 

VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches

VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches

Mar 04, 2025Ravie LakshmananVulnerability / Cloud Security Broadcom has released security updates to address three actively exploited security flaws in VMware ESXi, Workstation, and Fusion products that could lead to code execution and information disclosure.…