admin
April 15, 2025
The North Korea-linked threat actor assessed to be behind the massive Bybit hack in February 2025 has...
Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability

2 min read
admin
April 15, 2025
A recently disclosed security flaw in Gladinet CentreStack also impacts its Triofox remote access and collaboration solution,...
admin
April 15, 2025
Meta has announced that it will begin to train its artificial intelligence (AI) models using public data...
admin
April 14, 2025
Attackers aren’t waiting for patches anymore — they are breaking in before defenses are ready. Trusted security...
admin
April 14, 2025
Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT that has been observed in...
Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft

3 min read
admin
April 14, 2025
Cybersecurity researchers are calling attention to a new type of credential phishing scheme that ensures that the...
admin
April 14, 2025
AI is changing cybersecurity faster than many defenders realize. Attackers are already using AI to automate reconnaissance,...
admin
April 14, 2025
A threat actor with ties to Pakistan has been observed targeting various sectors in India with various...
Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

2 min read
admin
April 11, 2025
Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate...
admin
April 11, 2025
The threat actor known as Paper Werewolf has been observed exclusively targeting Russian entities with a new...
admin
April 11, 2025
What are IABs?
Initial Access Brokers (IABs) specialize in gaining unauthorized entry into computer systems and networks, then...
admin
April 11, 2025
Palo Alto Networks has revealed that it's observing brute-force login attempts against PAN-OS GlobalProtect gateways, days after...
admin
April 11, 2025
Cybersecurity researchers have found that threat actors are setting up deceptive websites hosted on newly registered domains...
admin
April 11, 2025
A newly disclosed high-severity security flaw impacting OttoKit (formerly SureTriggers) has come under active exploitation within a...
admin
April 10, 2025
Cybersecurity researchers have detailed a case of an incomplete patch for a previously addressed security flaw impacting...
admin
April 10, 2025
Threat actors are continuing to upload malicious packages to the npm registry so as to tamper with...
admin
April 10, 2025
Overview of the PlayPraetor Masquerading Party Variants
CTM360 has now identified a much larger extent of the ongoing...
admin
April 10, 2025
AI agents have rapidly evolved from experimental technology to essential business tools. The OWASP framework explicitly recognizes...
admin
April 10, 2025
The Russia-linked threat actor known as Gamaredon (aka Shuckworm) has been attributed to a cyber attack targeting...
admin
April 10, 2025
Law enforcement authorities have announced that they tracked down the customers of the SmokeLoader malware and detained...