admin
December 11, 2025
As enterprises refine their strategies for handling Non-Human Identities (NHIs), Robotic Process Automation (RPA) has become a...
ThreatsDay Bulletin: Spyware Alerts, Mirai Strikes, Docker Leaks, ValleyRAT Rootkit — and 20 More Stories
15 min read
admin
December 11, 2025
This week’s cyber stories show how fast the online world can turn risky. Hackers are sneaking malware...
admin
December 11, 2025
Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called NANOREMOTE that uses the Google...
Active Attacks Exploit Gladinet’s Hard-Coded Keys for Unauthorized Access and Code Execution
3 min read
admin
December 11, 2025
Huntress is warning of a new actively exploited vulnerability in Gladinet's CentreStack and Triofox products stemming from...
admin
December 11, 2025
An advanced persistent threat (APT) known as WIRTE has been attributed to attacks targeting government and diplomatic...
admin
December 11, 2025
A high-severity unpatched security vulnerability in Gogs has come under active exploitation, with more than 700 compromised...
admin
December 11, 2025
Google on Wednesday shipped security updates for its Chrome browser to address three security flaws, including one...
admin
December 10, 2025
React2Shell continues to witness heavy exploitation, with threat actors leveraging the maximum-severity security flaw in React Server...
admin
December 10, 2025
New research has uncovered exploitation primitives in the .NET Framework that could be leveraged against enterprise-grade applications...
admin
December 10, 2025
Three security vulnerabilities have been disclosed in the Peripheral Component Interconnect Express (PCIe) Integrity and Data Encryption...
Warning: WinRAR Vulnerability CVE-2025-6218 Under Active Attack by Multiple Threat Groups
3 min read
admin
December 10, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a security flaw impacting the WinRAR...
Webinar: How Attackers Exploit Cloud Misconfigurations Across AWS, AI Models, and Kubernetes
2 min read
admin
December 10, 2025
Cloud security is changing. Attackers are no longer just breaking down the door; they are finding unlocked...
admin
December 10, 2025
Microsoft closed out 2025 with patches for 56 security flaws in various products across the Windows platform,...
Fortinet, Ivanti, and SAP Issue Urgent Patches for Authentication and Code Execution Flaws
3 min read
admin
December 10, 2025
Fortinet, Ivanti, and SAP have moved to address critical security flaws in their products that, if successfully...
admin
December 9, 2025
Threat actors with ties to North Korea have likely become the latest to exploit the recently disclosed...
admin
December 9, 2025
Zero Trust helps organizations shrink their attack surface and respond to threats faster, but many still struggle...
admin
December 9, 2025
Google on Monday announced a set of new security features in Chrome, following the company's addition of...
Four Threat Clusters Using CastleLoader as GrayBravo Expands Its Malware Service Infrastructure
2 min read
admin
December 9, 2025
Four distinct threat activity clusters have been observed leveraging a malware loader known as CastleLoader, strengthening the...
Storm-0249 Escalates Ransomware Attacks with ClickFix, Fileless PowerShell, and DLL Sideloading
3 min read
admin
December 9, 2025
The threat actor known as Storm-0249 is likely shifting from its role as an initial access broker...
admin
December 9, 2025
Canadian organizations have emerged as the focus of a targeted cyber campaign orchestrated by a threat activity...
