admin
December 13, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a high-severity flaw impacting Sierra Wireless...
admin
December 13, 2025
Apple on Friday released security updates for iOS, iPadOS, macOS, tvOS, watchOS, visionOS, and its Safari web...
admin
December 12, 2025
Cybersecurity researchers are calling attention to a new campaign that's leveraging GitHub-hosted Python repositories to distribute a...
admin
December 12, 2025
Cybersecurity researchers have documented four new phishing kits named BlackForce, GhostFrame, InboxPrime AI, and Spiderman that are...
admin
December 12, 2025
The browser has become the main interface to GenAI for most enterprises: from web-based LLMs and copilots,...
admin
December 12, 2025
The React team has released fixes for two new types of flaws in React Server Components (RSC)...
React2Shell Exploitation Escalates into Large-Scale Global Attacks, Forcing Emergency Mitigation
3 min read
admin
December 12, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has urged federal agencies to patch the recent React2Shell...
admin
December 12, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting OSGeo...
admin
December 11, 2025
As enterprises refine their strategies for handling Non-Human Identities (NHIs), Robotic Process Automation (RPA) has become a...
ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories
15 min read
admin
December 11, 2025
This week’s cyber stories show how fast the online world can turn risky. Hackers are sneaking malware...
admin
December 11, 2025
Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called NANOREMOTE that uses the Google...
Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution
3 min read
admin
December 11, 2025
Huntress is warning of a new actively exploited vulnerability in Gladinet's CentreStack and Triofox products stemming from...
admin
December 11, 2025
An advanced persistent threat (APT) known as WIRTE has been attributed to attacks targeting government and diplomatic...
admin
December 11, 2025
A high-severity unpatched security vulnerability in Gogs has come under active exploitation, with more than 700 compromised...
admin
December 11, 2025
Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one...
admin
December 10, 2025
React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server...
admin
December 10, 2025
New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade applications...
admin
December 10, 2025
Three security vulnerabilities have been disclosed in the Peripheral Component Interconnect Express (PCIe) Integrity and Data Encryption...
Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups
3 min read
admin
December 10, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR...
Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes
2 min read
admin
December 10, 2025
Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked...
