admin
April 16, 2025
Cheap Android smartphones manufactured by Chinese companies have been observed pre-installed with trojanized apps masquerading as WhatsApp...
admin
April 15, 2025
The China-linked threat actor known as UNC5174 has been attributed to a new campaign that leverages a...
Critical Apache Roller Vulnerability (CVSS 10.0) Enables Unauthorized Session Persistence

2 min read
admin
April 15, 2025
A critical security vulnerability has been disclosed in the Apache Roller open-source, Java-based blogging server software that...
admin
April 15, 2025
Everybody knows browser extensions are embedded into nearly every user’s daily workflow, from spell checkers to GenAI...
admin
April 15, 2025
Cybersecurity researchers have disclosed a malicious package uploaded to the Python Package Index (PyPI) repository that's designed...
admin
April 15, 2025
The North Korea-linked threat actor assessed to be behind the massive Bybit hack in February 2025 has...
Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability

2 min read
admin
April 15, 2025
A recently disclosed security flaw in Gladinet CentreStack also impacts its Triofox remote access and collaboration solution,...
admin
April 15, 2025
Meta has announced that it will begin to train its artificial intelligence (AI) models using public data...
admin
April 14, 2025
Attackers aren’t waiting for patches anymore — they are breaking in before defenses are ready. Trusted security...
admin
April 14, 2025
Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT that has been observed in...
Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft

3 min read
admin
April 14, 2025
Cybersecurity researchers are calling attention to a new type of credential phishing scheme that ensures that the...
admin
April 14, 2025
AI is changing cybersecurity faster than many defenders realize. Attackers are already using AI to automate reconnaissance,...
admin
April 14, 2025
A threat actor with ties to Pakistan has been observed targeting various sectors in India with various...
Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

2 min read
admin
April 11, 2025
Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate...
admin
April 11, 2025
The threat actor known as Paper Werewolf has been observed exclusively targeting Russian entities with a new...
admin
April 11, 2025
What are IABs?
Initial Access Brokers (IABs) specialize in gaining unauthorized entry into computer systems and networks, then...
admin
April 11, 2025
Palo Alto Networks has revealed that it's observing brute-force login attempts against PAN-OS GlobalProtect gateways, days after...
admin
April 11, 2025
Cybersecurity researchers have found that threat actors are setting up deceptive websites hosted on newly registered domains...
admin
April 11, 2025
A newly disclosed high-severity security flaw impacting OttoKit (formerly SureTriggers) has come under active exploitation within a...
admin
April 10, 2025
Cybersecurity researchers have detailed a case of an incomplete patch for a previously addressed security flaw impacting...