Threatline

Cyber Security News From Around The World

Latest news as of 4/21/2025, 2:12:32 PM

The Hacker News

7 days ago

ResolverRAT Campaign Targets Healthcare, Pharma via Phishing and DLL Side-Loading

Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT that has been observed in attacks targeting healthcare and pharmaceutical sectors. "The threat actor leverages fear-based lures delivered via phishing emails, designed to pressure recipients into clicking a malicious link," Morphisec Labs researcher Nadav Lorber said in a report shared with The

Check Point Research

7 days ago

Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking

Research by: hasherezade Key Points Introduction Process injection is one of the important techniques used by attackers. We can find its variants implemented in almost every malware. It serves purposes such as: In our previous blog on process injections we explained the foundations of this topic and basic ideas behind detection and prevention. We also proposed a new technique dubbed Thread […] The post appeared first on . Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking Check Point Research

Bleeping Computer

7 days ago

Meta to resume AI training on content shared by Europeans

Meta announced today that it will soon start training its artificial intelligence models using content shared by European adult users on its Facebook and Instagram social media platforms. [...]

Dark Reading

7 days ago

A New 'It RAT': Stealthy 'Resolver' Malware Burrows In

A new infostealer on the market is making big waves globally, replacing Lumma et al. in attacks and employing so many stealth, persistence, and anti-analysis tricks that it's downright difficult to count them all.

The Hacker News

7 days ago

Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft

Cybersecurity researchers are calling attention to a new type of credential phishing scheme that ensures that the stolen information is associated with valid online accounts. The technique has been codenamed precision-validating phishing by Cofense, which it said employs real-time email validation so that only a select set of high-value targets are served the fake login screens. "This tactic not

Check Point Research

7 days ago

14th April – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 14th April, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES The United States Office of the Comptroller of the Currency (OCC), an independent bureau of the Department of the Treasury, has suffered a significant security breach. Threat actors have gained access to […] The post appeared first on . 14th April – Threat Intelligence Report Check Point Research

Bleeping Computer

7 days ago

Enhancing your DevSecOps with Wazuh, the open source XDR platform

Security shouldn't wait until the end of development. Wazuh brings real-time threat detection, compliance, and vulnerability scanning into your DevOps pipeline—powering a stronger DevSecOps strategy from day one. Learn more about how Wazuh can help secure your development cycle. [...]

Bleeping Computer

7 days ago

Kidney dialysis firm DaVita hit by weekend ransomware attack

Kidney dialysis firm DaVita disclosed Monday it suffered a weekend ransomware attack that encrypted parts of its network and impacted some of its operations. [...]

Dark Reading

7 days ago

7 RSAC 2025 Cloud Security Sessions You Don't Want to Miss

Some of the brightest minds in the industry will discuss how to strengthen cloud security.

Bleeping Computer

7 days ago

Microsoft tells Windows users to ignore 0x80070643 WinRE errors

Microsoft says some users might see 0x80070643 installation failures when trying to deploy the April 2025 Windows Recovery Environment (WinRE) updates. [...]