admin
November 14, 2025
Key Takeaways:
85 active ransomware and extortion groups observed in Q3 2025, reflecting the most decentralized ransomware ecosystem...
admin
November 14, 2025
State-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber...
admin
November 14, 2025
Cybersecurity researchers are sounding the alert about an authentication bypass vulnerability in Fortinet Fortiweb WAF that could...
admin
November 13, 2025
A Russian-speaking threat behind an ongoing, mass phishing campaign has registered more than 4,300 domain names since...
admin
November 13, 2025
Cybersecurity researchers have uncovered a malicious Chrome extension that poses as a legitimate Ethereum wallet but harbors...
When Attacks Come Faster Than Patches: Why 2026 Will be the Year of Machine-Speed Security
6 min read
admin
November 13, 2025
The Race for Every New CVE
Based on multiple 2025 industry reports: roughly 50 to 61 percent of...
Operation Endgame Dismantles Rhadamanthys, Venom RAT, and Elysium Botnet in Global Crackdown
2 min read
admin
November 13, 2025
Malware families like Rhadamanthys Stealer, Venom RAT, and the Elysium botnet have been disrupted as part of...
ThreatsDay Bulletin: Cisco 0-Days, AI Bug Bounties, Crypto Heists, State-Linked Leaks and 20 More Stories
14 min read
admin
November 13, 2025
Behind every click, there’s a risk waiting to be tested. A simple ad, email, or link can...
CISA Flags Critical WatchGuard Fireware Flaw Exposing 54,000 Fireboxes to No-Login Attacks
2 min read
admin
November 13, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting WatchGuard...
admin
November 13, 2025
Cybersecurity researchers are calling attention to a large-scale spam campaign that has flooded the npm registry with...
admin
November 12, 2025
Every day, security teams face the same problem—too many risks, too many alerts, and not enough time....
admin
November 12, 2025
Google has filed a civil lawsuit in the U.S. District Court for the Southern District of New...
admin
November 12, 2025
Amazon's threat intelligence team on Wednesday disclosed that it observed an advanced threat actor exploiting two then-zero-day...
admin
November 12, 2025
Active Directory remains the authentication backbone for over 90% of Fortune 1000 companies. AD's importance has grown as...
Microsoft Fixes 63 Security Flaws, Including a Windows Kernel Zero-Day Under Active Attack
4 min read
admin
November 12, 2025
Microsoft on Tuesday released patches for 63 new security vulnerabilities identified in its software, including one that...
admin
November 12, 2025
Google on Tuesday unveiled a new privacy-enhancing technology called Private AI Compute to process artificial intelligence (AI)...
admin
November 11, 2025
Threat hunters have uncovered similarities between a banking malware called Coyote and a newly disclosed malicious program...
admin
November 11, 2025
AI-enabled supply chain attacks jumped 156% last year. Discover why traditional defenses are failing and what CISOs...
admin
November 11, 2025
Cybersecurity researchers have discovered a malicious npm package named "@acitons/artifact" that typosquats the legitimate "@actions/artifact" package with...
admin
November 11, 2025
Cybersecurity researchers have disclosed details of a new Android remote access trojan (RAT) called Fantasy Hub that's...
