admin
May 31, 2025
A multinational law enforcement operation has resulted in the takedown of an online cybercrime syndicate that offered...
admin
May 30, 2025
A new malware campaign is distributing a novel Rust-based information stealer dubbed EDDIESTEALER using the popular ClickFix...
admin
May 30, 2025
The China-linked threat actor behind the recent in-the-wild exploitation of a critical security flaw in SAP NetWeaver...
admin
May 30, 2025
Breaking Out of the Security Mosh Pit
When Jason Elrod, CISO of MultiCare Health System, describes legacy healthcare...
admin
May 30, 2025
The U.S. Department of Treasury's Office of Foreign Assets Control (OFAC) has levied sanctions against a Philippines-based...
admin
May 30, 2025
ConnectWise, the developer of remote access and support software ScreenConnect, has disclosed that it was the victim...
admin
May 30, 2025
Meta on Thursday revealed that it disrupted three covert influence operations originating from Iran, China, and Romania...
admin
May 29, 2025
Fake installers for popular artificial intelligence (AI) tools like OpenAI ChatGPT and InVideo AI are being used...
admin
May 29, 2025
Cybersecurity researchers have taken the wraps off an unusual cyber attack that leveraged malware with corrupted DOS...
admin
May 29, 2025
Google on Wednesday disclosed that the Chinese state-sponsored threat actor known as APT41 leveraged a malware called...
admin
May 29, 2025
The threat actors behind the DragonForce ransomware gained access to an unnamed Managed Service Provider's (MSP) SimpleHelp...
Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin

2 min read
admin
May 29, 2025
Cybersecurity researchers have disclosed a critical unpatched security flaw impacting TI WooCommerce Wishlist plugin for WordPress that...
admin
May 28, 2025
Stealer malware no longer just steals passwords. In 2025, it steals live sessions—and attackers are moving faster...
admin
May 28, 2025
An Iranian national has pleaded guilty in the U.S. over his involvement in an international ransomware and...
admin
May 28, 2025
The Czech Republic on Wednesday formally accused a threat actor associated with the People's Republic of China...
admin
May 28, 2025
Cybersecurity researchers have discovered a security flaw in Microsoft's OneDrive File Picker that, if successfully exploited, could...
admin
May 28, 2025
Embedded Linux-based Internet of Things (IoT) devices have become the target of a new botnet dubbed PumaBot.
Written...
admin
May 28, 2025
A financially motivated threat actor has been observed exploiting a recently disclosed remote code execution flaw affecting...
admin
May 28, 2025
Would you expect an end user to log on to a cybercriminal’s computer, open their browser, and...
251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch

2 min read
admin
May 28, 2025
Cybersecurity researchers have disclosed details of a coordinated cloud-based scanning activity that targeted 75 distinct "exposure points"...