admin
March 19, 2025
Identity-based attacks are on the rise. Attackers are targeting identities with compromised credentials, hijacked authentication methods, and...
admin
March 19, 2025
Cybersecurity researchers have disclosed details of two critical flaws impacting mySCADA myPRO, a Supervisory Control and Data...
admin
March 18, 2025
Cybersecurity researchers have disclosed details of a new supply chain attack vector dubbed Rules File Backdoor that...
admin
March 18, 2025
An unpatched security flaw impacting Microsoft Windows has been exploited by 11 state-sponsored groups from China, Iran,...
admin
March 18, 2025
Google is making the biggest ever acquisition in its history by purchasing cloud security company Wiz in...
admin
March 18, 2025
A critical security vulnerability has been disclosed in AMI's MegaRAC Baseboard Management Controller (BMC) software that could...
admin
March 18, 2025
While Okta provides robust native security features, configuration drift, identity sprawl, and misconfigurations can provide opportunities for...
admin
March 18, 2025
Threat hunters have shed more light on a previously disclosed malware campaign undertaken by the China-aligned MirrorFace...
admin
March 18, 2025
At least four different threat actors have been identified as involved in an updated version of a...
admin
March 18, 2025
Microsoft is calling attention to a novel remote access trojan (RAT) named StilachiRAT that it said employs...
admin
March 17, 2025
Malicious actors are exploiting Cascading Style Sheets (CSS), which are used to style and format the layout...
admin
March 17, 2025
A recently disclosed security flaw impacting Apache Tomcat has come under active exploitation in the wild following...
admin
March 17, 2025
An unpatched security flaw impacting the Edimax IC-7100 network camera is being exploited by threat actors to...
admin
March 17, 2025
From sophisticated nation-state campaigns to stealthy malware lurking in unexpected places, this week’s cybersecurity landscape is a...
admin
March 17, 2025
The latest Palo Alto Networks Unit 42 Cloud Threat Report found that sensitive data is found in...
admin
March 17, 2025
Cybersecurity researchers are calling attention to an incident in which the popular GitHub Action tj-actions/changed-files was compromised...
admin
March 15, 2025
Cybersecurity researchers have warned of a malicious campaign targeting users of the Python Package Index (PyPI) repository...
Alleged Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime Charges

2 min read
admin
March 14, 2025
A 51-year-old dual Russian and Israeli national who is alleged to be a developer of the LockBit...
admin
March 14, 2025
The GSM Association (GSMA) has formally announced support for end-to-end encryption (E2EE) for securing messages sent via...
admin
March 14, 2025
Cyber threats evolve daily. In this live webinar, learn exactly how ransomware attacks unfold—from the initial breach...