Malicious VSX Extension “SleepyDuck” Uses Ethereum to Keep Its Command Server Alive on November 3, 2025 Posted by The Hacker News
XWiki SolrSearch Exploit Attempts (CVE-2025-24893) with link to Chicago Gangs/Rappers, (Mon, Nov 3rd) on November 3, 2025 Posted by SANS Internet Storm Center, InfoCON: green
Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering on November 3, 2025 Posted by samanthar@checkpoint.com
Posted in Hacking news New Android 14 Security Feature: IT Admins Can Now Disable 2G Networks on August 8, 2023 The Hacker News
Posted in Hacking news Microsoft Releases Patches for 74 New Vulnerabilities in August Update on August 8, 2023 The Hacker News
Posted in Hacking news Malicious Campaigns Exploit Weak Kubernetes Clusters for Crypto Mining on August 8, 2023 The Hacker News
Posted in Hacking news New Report Exposes Vice Society’s Collaboration with Rhysida Ransomware on August 8, 2023 The Hacker News
Posted in Hacking news QakBot Malware Operators Expand C2 Network with 15 New Servers on August 8, 2023 The Hacker News
Posted in Hacking news Hackers Abusing Cloudflare Tunnels for Covert Communications on August 8, 2023 The Hacker News
Posted in Hacking news Understanding Active Directory Attack Paths to Improve Security on August 8, 2023 The Hacker News
Posted in Hacking news New Yashma Ransomware Variant Targets Multiple English-Speaking Countries on August 8, 2023 The Hacker News
Posted in Hacking news LOLBAS in the Wild: 11 Living-Off-The-Land Binaries Used for Malicious Purposes on August 8, 2023 The Hacker News
Posted in Hacking news LOLBAS in the Wild: 11 Living-Off-The-Land Binaries Used for Malicious Purposes on August 8, 2023 The Hacker News