admin
October 6, 2025
Oracle has released an emergency update to address a critical security flaw in its E-Business Suite that...
admin
October 4, 2025
Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity's agentic AI browser Comet...
admin
October 4, 2025
Threat intelligence firm GreyNoise disclosed on Friday that it has observed a spike in scanning activity targeting...
admin
October 3, 2025
A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known...
admin
October 3, 2025
Brazilian users have emerged as the target of a new self-propagating malware that spreads via the popular...
admin
October 3, 2025
The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt...
admin
October 3, 2025
Passwork is positioned as an on-premises unified platform for both password and secrets management, aiming to address...
admin
October 3, 2025
A threat actor that's known to share overlaps with a hacking group called YoroTrooper has been observed...
admin
October 3, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Smartbedded...
admin
October 2, 2025
Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation,...
ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More
15 min read
admin
October 2, 2025
From unpatched cars to hijacked clouds, this week’s Threatsday headlines remind us of one thing — no...
admin
October 2, 2025
Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that they are tracking a new cluster...
admin
October 2, 2025
The threat actor known as Confucius has been attributed to a new phishing campaign that has targeted...
admin
October 2, 2025
Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository that claims to...
admin
October 2, 2025
Running a SOC often feels like drowning in alerts. Every morning, dashboards light up with thousands of...
admin
October 2, 2025
Cybersecurity researchers have discovered two Android spyware campaigns dubbed ProSpy and ToSpy that impersonate apps like Signal...
admin
October 1, 2025
In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated...
admin
October 1, 2025
A high-severity security flaw has been disclosed in the One Identity OneLogin Identity and Access Management (IAM)...
admin
October 1, 2025
AI is changing automation—but not always for the better. That’s why we’re hosting a new webinar, "Workflow...
admin
October 1, 2025
A severe security flaw has been disclosed in the Red Hat OpenShift AI service that could allow...
