Exploiting the AI Boom: How Threat Actors Are Targeting Trust in Generative Platforms like Kling AIMay 20, 2025
Ethical Hacking & Penetration Testing Operation Eastwood disrupted operations of pro-Russian hacker group NoName057(16)By HackWatchitJuly 16, 20250
Ethical Hacking & Penetration Testing Chinese APT compromises U.S. Army National Guard networkBy HackWatchitJuly 16, 20250
Ethical Hacking & Penetration Testing U.S. CISA adds Wing FTP Server flaw to its Known Exploited Vulnerabilities catalogBy HackWatchitJuly 16, 20250
Ethical Hacking & Penetration Testing Android Malware Konfety evolves with ZIP manipulation and dynamic loadingBy HackWatchitJuly 16, 20250
Ethical Hacking & Penetration Testing North Korea-linked actors spread XORIndex malware via 67 malicious npm packagesBy HackWatchitJuly 15, 20250
Ethical Hacking & Penetration Testing An attacker using a $500 radio setup could potentially trigger train brake failures or derailments from a distanceBy HackWatchitJuly 15, 20250
Ethical Hacking & Penetration Testing Interlock ransomware group deploys new PHP-based RAT via FileFixBy HackWatchitJuly 14, 20250
Ethical Hacking & Penetration Testing Global Louis Vuitton data breach impacts UK, South Korea, and TurkeyBy HackWatchitJuly 14, 20250