Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Tag: Malicious

Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins

Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins

Cyber Security News
First-Ever Malicious MCP Server Found in the Wild Steals Emails via AI Agents

First-Ever Malicious MCP Server Found in the Wild Steals Emails via AI Agents

Cyber Security News
New Malicious Rust Crates Impersonating fast_log to Steal Solana and Ethereum Wallet Keys

New Malicious Rust Crates Impersonating fast_log to Steal Solana and Ethereum Wallet Keys

Cyber Security News
Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed

Malicious Rust Crates Steal Solana and Ethereum Keys — 8,424 Downloads Confirmed

The Hacker News
Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts

Critical DNN Platform Vulnerability Let Attackers Execute Malicious Scripts

Cyber Security News
RainyDay, Turian and Naikon Malwares Abuse DLL Search Order to Execute Malicious Loaders

RainyDay, Turian and Naikon Malwares Abuse DLL Search Order to Execute Malicious Loaders

Cyber Security News
Hackers Can Bypass EDR by Downloading Malicious File as In-Memory PE Loader

Hackers Can Bypass EDR by Downloading Malicious File as In-Memory PE Loader

Cyber Security News
Hackers Exploiting Libraesva Email Security Gateway Vulnerability to Inject Malicious Commands

Hackers Exploiting Libraesva Email Security Gateway Vulnerability to Inject Malicious Commands

Cyber Security News
Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security

Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security

The Hacker News
Hackers Weaponizing SVG Files to Stealthily Deliver Malicious Payloads

Hackers Weaponizing SVG Files to Stealthily Deliver Malicious Payloads

Cyber Security News
Libraesva ESG Vulnerability Let Attackers Inject Malicious Commands

Libraesva ESG Vulnerability Let Attackers Inject Malicious Commands

Cyber Security News
Hackers Injecting Malicious Code into GitHub Actions Workflows to Steal PyPI Publishing Tokens

Hackers Injecting Malicious Code into GitHub Actions Workflows to Steal PyPI Publishing Tokens

Cyber Security News

Posts pagination

Previous 1 … 14 15 16 … 27 Next

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Global Cyber Threats Target Defense Sector Amid Rising Tensions
  • Fake AI Chrome Extensions Compromise Over 260,000 Users
  • Russian Group Linked to Malware Attacks on Ukraine
  • XWorm RAT Campaign Evades Detection with Excel Exploit
  • UAT-9921 Targets Tech and Finance with VoidLink Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News