251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch

2 min read
admin
May 28, 2025
Cybersecurity researchers have disclosed details of a coordinated cloud-based scanning activity that targeted 75 distinct "exposure points"...
admin
May 28, 2025
Apple on Tuesday revealed that it prevented over $9 billion in fraudulent transactions in the last five...
admin
May 27, 2025
Microsoft has shed light on a previously undocumented cluster of malicious activity originating from a Russia-affiliated threat...
admin
May 27, 2025
Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub Copilot’s code completions to chatbots that...
admin
May 27, 2025
Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into...
admin
May 27, 2025
Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques...
Hackers Are Calling Your Office: FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign

3 min read
admin
May 27, 2025
The U.S. Federal Bureau of Investigation (FBI) has warned of social engineering attacks mounted by a criminal...
admin
May 27, 2025
The Russia-aligned threat actor known as TAG-110 has been observed conducting a spear-phishing campaign targeting Tajikistan using...
admin
May 26, 2025
Are your web privacy controls protecting your users, or just a box-ticking exercise? This CISO’s guide provides...
admin
May 26, 2025
As many as 60 malicious npm packages have been discovered in the package registry with malicious functionality...
⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs

18 min read
admin
May 26, 2025
Cyber threats don't show up one at a time anymore. They’re layered, planned, and often stay hidden...
admin
May 25, 2025
Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like...
admin
May 24, 2025
The malware known as Latrodectus has become the latest to embrace the widely-used social engineering technique called...
admin
May 23, 2025
Cybersecurity researchers have disclosed that a threat actor codenamed ViciousTrap has compromised nearly 5,300 unique network edge...
admin
May 23, 2025
As part of the latest "season" of Operation Endgame, a coalition of law enforcement agencies have taken...
SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection

4 min read
admin
May 23, 2025
From zero-day exploits to large-scale bot attacks — the demand for a powerful, self-hosted, and user-friendly web...
admin
May 23, 2025
The U.S. Department of Justice (DoJ) on Thursday announced the disruption of the online infrastructure associated with...
admin
May 23, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday revealed that Commvault is monitoring cyber threat...
admin
May 23, 2025
Cybersecurity researchers have discovered an indirect prompt injection flaw in GitLab's artificial intelligence (AI) assistant Duo that...
admin
May 22, 2025
It’s not enough to be secure. In today’s legal climate, you need to prove it.
Whether you’re protecting...