admin
October 7, 2025
Cybersecurity researchers have charted the evolution of XWorm malware, turning it into a versatile tool for supporting...
admin
October 7, 2025
Redis has disclosed details of a maximum-severity security flaw in its in-memory database software that could result...
admin
October 7, 2025
Microsoft on Monday attributed a threat actor it tracks as Storm-1175 to the exploitation of a critical...
admin
October 7, 2025
CrowdStrike on Monday said it's attributing the exploitation of a recently disclosed security flaw in Oracle E-Business...
admin
October 6, 2025
The cyber world never hits pause, and staying alert matters more than ever. Every week brings new...
admin
October 6, 2025
In the era of rapidly advancing artificial intelligence (AI) and cloud technologies, organizations are increasingly implementing security...
admin
October 6, 2025
A Chinese company named the Beijing Institute of Electronics Technology and Application (BIETA) has been assessed to...
admin
October 6, 2025
A now patched security vulnerability in Zimbra Collaboration was exploited as a zero-day earlier this year in...
admin
October 6, 2025
Oracle has released an emergency update to address a critical security flaw in its E-Business Suite that...
admin
October 4, 2025
Cybersecurity researchers have disclosed details of a new attack called CometJacking targeting Perplexity's agentic AI browser Comet...
admin
October 4, 2025
Threat intelligence firm GreyNoise disclosed on Friday that it has observed a spike in scanning activity targeting...
admin
October 3, 2025
A threat actor named Detour Dog has been outed as powering campaigns distributing an information stealer known...
admin
October 3, 2025
Brazilian users have emerged as the target of a new self-propagating malware that spreads via the popular...
admin
October 3, 2025
The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt...
admin
October 3, 2025
Passwork is positioned as an on-premises unified platform for both password and secrets management, aiming to address...
admin
October 3, 2025
A threat actor that's known to share overlaps with a hacking group called YoroTrooper has been observed...
admin
October 3, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw impacting Smartbedded...
admin
October 2, 2025
Penetration testing is critical to uncovering real-world security weaknesses. With the shift into continuous testing and validation,...
ThreatsDay Bulletin: CarPlay Exploit, BYOVD Tactics, SQL C2 Attacks, iCloud Backdoor Demand & More

15 min read
admin
October 2, 2025
From unpatched cars to hijacked clouds, this week’s Threatsday headlines remind us of one thing — no...
admin
October 2, 2025
Google Mandiant and Google Threat Intelligence Group (GTIG) have disclosed that they are tracking a new cluster...