admin
July 1, 2025
Google has released security updates to address a vulnerability in its Chrome browser for which an exploit...
admin
July 1, 2025
The U.S. Department of Justice (DoJ) on Monday announced sweeping actions targeting the North Korean information technology...
admin
July 1, 2025
Microsoft has said that it's ending support for passwords in its Authenticator app starting August 1, 2025.
The...
admin
June 30, 2025
U.S. cybersecurity and intelligence agencies have issued a joint advisory warning of potential cyber-attacks from Iranian state-sponsored...
admin
June 30, 2025
Europol on Monday announced the takedown of a cryptocurrency investment fraud ring that laundered €460 million ($540...
admin
June 30, 2025
The threat actor known as Blind Eagle has been attributed with high confidence to the use of...
admin
June 30, 2025
Identity-based attacks are on the rise. Attacks in which malicious actors assume the identity of an entity...
admin
June 30, 2025
Ever wonder what happens when attackers don’t break the rules—they just follow them better than we do?...
admin
June 28, 2025
The U.S. Federal Bureau of Investigation (FBI) has revealed that it has observed the notorious cybercrime group...
admin
June 28, 2025
The threat actor behind the GIFTEDCROOK malware has made significant updates to turn the malicious program from...
Facebook’s New AI Tool Asks to Upload Your Photos for Story Ideas, Sparking Privacy Concerns

4 min read
admin
June 28, 2025
Facebook, the social network platform owned by Meta, is asking for users to upload pictures from their...
admin
June 27, 2025
Threat hunters have discovered a network of more than 1,000 compromised small office and home office (SOHO)...
admin
June 27, 2025
A China-linked threat actor known as Mustang Panda has been attributed to a new cyber espionage campaign...
admin
June 27, 2025
Security operations centers (SOCs) are under pressure from both sides: threats are growing more complex and frequent,...
admin
June 27, 2025
A new campaign has been observed leveraging fake websites advertising popular software such as WPS Office, Sogou,...
admin
June 27, 2025
Threat intelligence firm GreyNoise is warning of a "notable surge" in scanning activity targeting Progress MOVEit Transfer...
admin
June 27, 2025
Cybersecurity researchers have detailed a new campaign dubbed OneClik that leverages Microsoft's ClickOnce software deployment technology and...
admin
June 27, 2025
Cybersecurity researchers have disclosed a critical vulnerability in the Open VSX Registry ("open-vsx[.]org") that, if successfully exploited,...
Critical RCE Flaws in Cisco ISE and ISE-PIC Allow Unauthenticated Attackers to Gain Root Access

2 min read
admin
June 26, 2025
Cisco has released updates to address two maximum-severity security flaws in Identity Services Engine (ISE) and ISE...
admin
June 26, 2025
The ClickFix social engineering tactic as an initial access vector using fake CAPTCHA verifications increased by 517%...