admin
July 16, 2025
A threat activity cluster has been observed targeting fully-patched end-of-life SonicWall Secure Mobile Access (SMA) 100 series...
Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time

2 min read
admin
July 16, 2025
Social engineering attacks have entered a new era—and they’re coming fast, smart, and deeply personalized.
It’s no longer...
admin
July 16, 2025
Cybersecurity researchers have discovered a new, sophisticated variant of a known Android malware referred to as Konfety...
Urgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild

2 min read
admin
July 16, 2025
Google on Tuesday rolled out fixes for six security issues in its Chrome web browser, including one...
Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act

3 min read
admin
July 16, 2025
Google on Tuesday revealed that its large language model (LLM)-assisted vulnerability discovery framework discovered a security flaw...
admin
July 15, 2025
Cloudflare on Tuesday said it mitigated 7.3 million distributed denial-of-service (DDoS) attacks in the second quarter of...
admin
July 15, 2025
Cybersecurity researchers have shed light on a new ransomware-as-a-service (RaaS) operation called GLOBAL GROUP that has targeted...
admin
July 15, 2025
Governmental organizations in Southeast Asia are the target of a new campaign that aims to collect sensitive...
admin
July 15, 2025
AI agents promise to automate everything from financial reconciliations to incident response. Yet every time an AI...
admin
July 15, 2025
Cybersecurity researchers have charted the evolution of a widely used remote access trojan called AsyncRAT, which was...
admin
July 15, 2025
The North Korean threat actors linked to the Contagious Interview campaign have been observed publishing another set...
admin
July 15, 2025
While phishing and ransomware dominate headlines, another critical risk quietly persists across most enterprises: exposed Git repositories...
New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries

3 min read
admin
July 15, 2025
Threat actors behind the Interlock ransomware group have unleashed a new PHP variant of its bespoke remote...
⚡ Weekly Recap: Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More

22 min read
admin
July 14, 2025
In cybersecurity, precision matters—and there’s little room for error. A small mistake, missed setting, or quiet misconfiguration...
admin
July 14, 2025
India's Central Bureau of Investigation (CBI) has announced that it has taken steps to dismantle what it...
eSIM Vulnerability in Kigen’s eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks

3 min read
admin
July 14, 2025
Cybersecurity researchers have discovered a new hacking technique that exploits weaknesses in the eSIM technology used in...
admin
July 12, 2025
NVIDIA is urging customers to enable System-level Error Correction Codes (ECC) as a defense against a variant...
admin
July 12, 2025
Cybersecurity researchers have discovered a serious security issue that allows leaked Laravel APP_KEYs to be weaponized to...
admin
July 11, 2025
Fortinet has released fixes for a critical security flaw impacting FortiWeb that could enable an unauthenticated attacker...
PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution

5 min read
admin
July 11, 2025
Cybersecurity researchers have discovered a set of four security flaws in OpenSynergy's BlueSDK Bluetooth stack that, if...