admin
October 13, 2025
Malware campaigns distributing the RondoDox botnet have expanded their targeting focus to exploit more than 50 vulnerabilities...
admin
October 13, 2025
Microsoft said it has revamped the Internet Explorer (IE) mode in its Edge browser after receiving "credible...
admin
October 13, 2025
Cybersecurity researchers are calling attention to a new campaign that delivers the Astaroth banking trojan that employs...
admin
October 13, 2025
Cybersecurity researchers have disclosed details of a new Rust-based backdoor called ChaosBot that can allow operators to...
admin
October 12, 2025
Oracle on Saturday issued a security alert warning of a fresh security flaw impacting its E-Business Suite...
admin
October 11, 2025
Cybersecurity company Huntress on Friday warned of "widespread compromise" of SonicWall SSL VPN devices to access multiple...
admin
October 11, 2025
Threat actors are abusing Velociraptor, an open-source digital forensics and incident response (DFIR) tool, in connection with...
admin
October 10, 2025
Fortra on Thursday revealed the results of its investigation into CVE-2025-10035, a critical security flaw in GoAnywhere...
admin
October 10, 2025
Cybersecurity researchers have disclosed details of an active malware campaign called Stealit that has leveraged Node.js' Single...
Microsoft Warns of ‘Payroll Pirates’ Hijacking HR SaaS Accounts to Steal Employee Salaries
2 min read
admin
October 10, 2025
A threat actor known as Storm-2657 has been observed hijacking employee accounts with the end goal of...
admin
October 10, 2025
The SOC of 2026 will no longer be a human-only battlefield. As organizations scale and threats evolve...
admin
October 10, 2025
Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm registry that have...
admin
October 10, 2025
Cybersecurity company Huntress said it has observed active in-the-wild exploitation of an unpatched security flaw impacting Gladinet...
admin
October 10, 2025
Dozens of organizations may have been impacted following the zero-day exploitation of a security flaw in Oracle's...
admin
October 9, 2025
Token theft is a leading cause of SaaS breaches. Discover why OAuth and API tokens are often...
admin
October 9, 2025
A China-aligned threat actor codenamed UTA0388 has been attributed to a series of spear-phishing campaigns targeting North...
admin
October 9, 2025
A rapidly evolving Android spyware campaign called ClayRat has targeted users in Russia using a mix of...
admin
October 9, 2025
SonicWall on Wednesday disclosed that an unauthorized party accessed firewall configuration backup files for all customers who...
ThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More
12 min read
admin
October 9, 2025
Cyber threats are evolving faster than ever. Attackers now combine social engineering, AI-driven manipulation, and cloud exploitation...
admin
October 9, 2025
Russian hackers' adoption of artificial intelligence (AI) in cyber attacks against Ukraine has reached a new level...
