admin
July 5, 2025
Threat actors are weaponizing exposed Java Debug Wire Protocol (JDWP) interfaces to obtain code execution capabilities and...
admin
July 5, 2025
Taiwan's National Security Bureau (NSB) has warned that China-developed applications like RedNote (aka Xiaohongshu), Weibo, TikTok, WeChat,...
NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors

2 min read
admin
July 4, 2025
Cybersecurity researchers have shed light on a previously undocumented threat actor called NightEagle (aka APT-Q-95) that has...
admin
July 4, 2025
Generative AI is changing how businesses work, learn, and innovate. But beneath the surface, something dangerous is...
Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros

3 min read
admin
July 4, 2025
Cybersecurity researchers have disclosed two security flaws in the Sudo command-line utility for Linux and Unix-like operating...
admin
July 4, 2025
Google has been ordered by a court in the U.S. state of California to pay $314 million...
Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams

7 min read
admin
July 3, 2025
A mobile ad fraud operation dubbed IconAds that consisted of 352 Android apps has been disrupted, according...
admin
July 3, 2025
Cybersecurity researchers have uncovered over 40 malicious browser extensions for Mozilla Firefox that are designed to steal...
admin
July 3, 2025
If you’re evaluating AI-powered SOC platforms, you’ve likely seen bold claims: faster triage, smarter remediation, and less...
admin
July 3, 2025
The French cybersecurity agency on Tuesday revealed that a number of entities spanning governmental, telecommunications, media, finance,...
admin
July 3, 2025
Cisco has released security updates to address a maximum-severity security flaw in Unified Communications Manager (Unified CM)...
admin
July 3, 2025
Threat actors with ties to North Korea have been observed targeting Web3 and cryptocurrency-related businesses with malware...
Vercel’s v0 AI Tool Weaponized by Cybercriminals to Rapidly Create Fake Login Pages at Scale

2 min read
admin
July 2, 2025
Unknown threat actors have been observed weaponizing v0, a generative artificial intelligence (AI) tool from Vercel, to...
admin
July 2, 2025
With nearly 80% of cyber threats now mimicking legitimate user behavior, how are top SOCs determining what’s...
Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns

5 min read
admin
July 2, 2025
Cybersecurity researchers are calling attention to phishing campaigns that impersonate popular brands and trick targets into calling...
U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware

3 min read
admin
July 2, 2025
The U.S. Department of the Treasury's Office of Foreign Assets Control (OFAC) has levied sanctions against Russia-based...
admin
July 2, 2025
Cybersecurity researchers have discovered a critical security vulnerability in artificial intelligence (AI) company Anthropic's Model Context Protocol...
admin
July 1, 2025
Cybersecurity researchers have flagged the tactical similarities between the threat actors behind the RomCom RAT and a...
New Flaw in IDEs Like Visual Studio Code Lets Malicious Extensions Bypass Verified Status

3 min read
admin
July 1, 2025
A new study of integrated development environments (IDEs) like Microsoft Visual Studio Code, Visual Studio, IntelliJ IDEA,...
admin
July 1, 2025
Despite years of investment in Zero Trust, SSE, and endpoint protection, many enterprises are still leaving one...