CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign on July 18, 2025 Posted by The Hacker News
Loaf and order: Belgian police launch bread-based cybersecurity campaign on July 18, 2025 Posted by Graham Cluley
Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices on July 18, 2025 Posted by The Hacker News
Posted in Hacking news CERT-UA Discovers LAMEHUG Malware Linked to APT28, Using LLM for Phishing Campaign on July 18, 2025 The Hacker News
Posted in Hacking news Google Sues 25 Chinese Entities Over BADBOX 2.0 Botnet Affecting 10M Android Devices on July 18, 2025 The Hacker News
Posted in Hacking news Critical NVIDIA Container Toolkit Flaw Allows Privilege Escalation on AI Cloud Services on July 18, 2025July 18, 2025 The Hacker News
Posted in Hacking news From Backup to Cyber Resilience: Why IT Leaders Must Rethink Backup in the Age of Ransomware on July 18, 2025 The Hacker News
Posted in Hacking news Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters on July 17, 2025 The Hacker News
Posted in Hacking news Hackers Exploit Apache HTTP Server Flaw to Deploy Linuxsys Cryptocurrency Miner on July 17, 2025 The Hacker News
Posted in Hacking news Europol Disrupts NoName057(16) Hacktivist Group Linked to DDoS Attacks Against Ukraine on July 17, 2025 The Hacker News
Posted in Hacking news CTEM vs ASM vs Vulnerability Management: What Security Leaders Need to Know in 2025 on July 17, 2025 The Hacker News
Posted in Hacking news Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors on July 17, 2025 The Hacker News
Posted in Hacking news Cisco Warns of Critical ISE Flaw Allowing Unauthenticated Attackers to Execute Root Code on July 16, 2025 The Hacker News