Iran-affiliated cyber actors are targeting internet-facing operational technology (OT) devices across critical infrastructures in the U.S., including programmable logic controllers…
Browsing: hackers
A critical vulnerability in the Ninja Forms File Uploads premium add-on for WordPress allows uploading arbitrary files without authentication, which…
The stolen information could help the hackers plan follow-up attacks and breach more organizations, Cisco researchers said.
The North Korean threat actor blamed for the Axios supply chain attack has been aiming its social engineering campaign at…
Ravie LakshmananApr 06, 2026Malware / Threat Intelligence Threat actors likely associated with the Democratic People’s Republic of Korea (DPRK) have been…
Charming Kitten relies on deception rather than exploiting technical software vulnerabilitiesFake identities build trust before phishing attacks compromise sensitive user…
Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell (CVE-2025-55182) in vulnerable Next.js…
A North Korean threat actor is likely to be blamed for a $285 million heist from decentralized finance (DeFi) platform…
The Drift Protocol lost at least $280 million after a threat actor took control of its Security Council administrative powers…
Ravie LakshmananApr 02, 2026Vulnerability / Threat Intelligence A large-scale credential harvesting operation has been observed exploiting the React2Shell vulnerability as an initial infection…
