#ThreatResearch #CybersecurityNews #CyberAttack #DataBreach #RansomMonitor #Hacked! #Youtube #PoweredbyAI
Threat Research
-
Active Lumma Stealer Campaign Impacting U.S. SLTTs
-
RaaS Evolved: LockBit 3.0 vs LockBit 4.0
-
Tempted to Classifying APT Actors: Practical Challenges of Attribution in the Case of Lazarus’s Subgroup
-
Warning Against Phishing Emails Distributing GuLoader Malware by Impersonating a Famous International Shipping Company
Security News
-
AMOS Stealer Revamped to Serve as a Fully Undetected macOS Threat
-
Inside Hunters International Group: How a Retailer Became the Latest Ransomware Victim
-
Hong Kong Tightens Cyber Laws—What It Means for Businesses and Tech Investments
-
Remote Code Execution Vulnerabilities in Ingress NGINX | Wiz Blog
-
Cyberattack causes delays for South Africa’s largest chicken producer
-
Semrush Impersonation Scam Targets Google Ads
Cyber Attack & Data Breach
-
BreachForums Claims: Millions of Oracle Cloud Records Stolen
-
Babuk2 Ransomware Attempts Extortion Based on False Claims
-
New VanHelsing ransomware targets Windows, ARM, ESXi systems
-
23andMe files for bankruptcy, customers advised to delete DNA data
-
Police Investigates Ransomware Threat at Teays Valley Christian School in West Virginia
Youtube Overview
-
Finding a Use for GenAI in AppSec – Keith Hoodlet – ASW #323
-
BHIS – Talkin’ Bout [infosec] News 2025-03-24 #livestream #infosec #infosecnews
-
BMCMC Exploit Factory?! Cybersecurity’s Wildest Threats!
-
Can you hack a hub? #shorts #hub #switch #network #wireshark #ccna
-
This Simple URL Encoding Made me $50,000 in Bounties