admin
June 5, 2025
The U.S. Department of Justice (DoJ) on Wednesday announced the seizure of cryptocurrency funds and about 145...
admin
June 4, 2025
Google has disclosed details of a financially motivated threat cluster that it said "specialises" in voice phishing...
admin
June 4, 2025
Threat hunters are calling attention to a new variant of a remote access trojan (RAT) called Chaos...
admin
June 4, 2025
Traditional data leakage prevention (DLP) tools aren't keeping pace with the realities of how modern businesses use...
Malicious PyPI, npm, and Ruby Packages Exposed in Ongoing Open-Source Supply Chain Attacks

6 min read
admin
June 4, 2025
Several malicious packages have been uncovered across the npm, Python, and Ruby package repositories that drain funds...
admin
June 4, 2025
Hewlett Packard Enterprise (HPE) has released security updates to address as many as eight vulnerabilities in its...
admin
June 3, 2025
Threat hunters are alerting to a new campaign that employs deceptive websites to trick unsuspecting users into...
admin
June 3, 2025
Cybersecurity researchers have disclosed details of a critical security flaw in the Roundcube webmail software that has...
admin
June 3, 2025
In the wake of high-profile attacks on UK retailers Marks & Spencer and Co-op, Scattered Spider has...
admin
June 3, 2025
A growing number of malicious campaigns have leveraged a recently discovered Android banking trojan called Crocodilus to...
admin
June 3, 2025
Google has revealed that it will no longer trust digital certificates issued by Chunghwa Telecom and Netlock...
Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion

2 min read
admin
June 3, 2025
Microsoft and CrowdStrike have announced that they are teaming up to align their individual threat actor taxonomies...
admin
June 3, 2025
Google on Monday released out-of-band fixes to address three security issues in its Chrome browser, including one...
⚡ Weekly Recap: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More

19 min read
admin
June 2, 2025
If this had been a security drill, someone would’ve said it went too far. But it wasn’t...
admin
June 2, 2025
Cybersecurity researchers have discovered a new cryptojacking campaign that's targeting publicly accessible DevOps web servers such as...
admin
June 2, 2025
Three security vulnerabilities have been disclosed in preloaded Android applications on smartphones from Ulefone and Krüger&Matz that...
admin
June 2, 2025
Qualcomm has shipped security updates to address three zero-day vulnerabilities that it said have been exploited in...
admin
June 2, 2025
Cybersecurity researchers have warned of a new spear-phishing campaign that uses a legitimate remote access tool called...
admin
June 2, 2025
The evolution of cyber threats has forced organizations across all industries to rethink their security strategies. As...
admin
May 31, 2025
Two information disclosure flaws have been identified in apport and systemd-coredump, the core dump handlers in Ubuntu,...