admin
April 3, 2025
Counterfeit versions of popular smartphone models that are sold at reduced prices have been found to be...
admin
April 3, 2025
Threat hunters are warning of a sophisticated web skimmer campaign that leverages a legacy application programming interface...
admin
April 3, 2025
In one of the largest coordinated law enforcement operations, authorities have dismantled Kidflix, a streaming platform that...
admin
April 2, 2025
Cybersecurity researchers have disclosed details of a now-patched privilege escalation vulnerability in Google Cloud Platform (GCP) Cloud...
admin
April 2, 2025
Cybersecurity researchers have discovered an updated version of a malware loader called Hijack Loader that implements new...
admin
April 2, 2025
Introduction
As the cybersecurity landscape evolves, service providers play an increasingly vital role in safeguarding sensitive data and...
admin
April 2, 2025
Cybersecurity researchers have shed light on an "auto-propagating" cryptocurrency mining botnet called Outlaw (aka Dota) that's known...
admin
April 2, 2025
When assessing an organization’s external attack surface, encryption-related issues (especially SSL misconfigurations) receive special attention. Why? Their...
admin
April 2, 2025
The financially motivated threat actor known as FIN7 has been linked to a Python-based backdoor called Anubis...
admin
April 1, 2025
Exposed PostgreSQL instances are the target of an ongoing campaign designed to gain unauthorized access and deploy...
admin
April 1, 2025
On the 21st birthday of Gmail, Google has announced a major update that allows enterprise users to...
admin
April 1, 2025
A new sophisticated phishing-as-a-service (PhaaS) platform called Lucid has targeted 169 entities in 88 countries using smishing...
admin
April 1, 2025
Apple on Monday backported fixes for three vulnerabilities that have come under active exploitation in the wild...
admin
April 1, 2025
Cybersecurity researchers are warning of a spike in suspicious login scanning activity targeting Palo Alto Networks PAN-OS...
admin
April 1, 2025
Are your security tokens truly secure?
Explore how Reflectiz helped a giant retailer to expose a Facebook pixel...
admin
April 1, 2025
Cybersecurity researchers have shed light on a new China-linked threat actor called Earth Alux that has targeted...
admin
April 1, 2025
Apple has been hit with a fine of €150 million ($162 million) by France's competition watchdog over...
Russian Hackers Exploit CVE-2025-26633 via MSC EvilTwin to Deploy SilentPrism and DarkWisp

3 min read
admin
March 31, 2025
The threat actors behind the zero-day exploitation of a recently-patched security vulnerability in Microsoft Windows have been...
admin
March 31, 2025
Threat actors are using the "mu-plugins" directory in WordPress sites to conceal malicious code with the goal...
admin
March 31, 2025
Every week, someone somewhere slips up—and threat actors slip in. A misconfigured setting, an overlooked vulnerability, or...