admin
April 16, 2025
Introduction
Cyber threats targeting supply chains have become a growing concern for businesses across industries. As companies continue...
admin
April 16, 2025
Cybersecurity researchers have detailed four different vulnerabilities in a core component of the Windows task scheduling service...
admin
April 16, 2025
Google on Wednesday revealed that it suspended over 39.2 million advertiser accounts in 2024, with a majority...
admin
April 16, 2025
The U.S. government funding for non-profit research giant MITRE to operate and maintain its Common Vulnerabilities and...
admin
April 16, 2025
Cybersecurity researchers have unearthed a new controller component associated with a known backdoor called BPFDoor as part...
admin
April 16, 2025
Intro: Why hack in when you can log in?
SaaS applications are the backbone of modern organizations, powering...
admin
April 16, 2025
Cheap Android smartphones manufactured by Chinese companies have been observed pre-installed with trojanized apps masquerading as WhatsApp...
admin
April 15, 2025
The China-linked threat actor known as UNC5174 has been attributed to a new campaign that leverages a...
Critical Apache Roller Vulnerability (CVSS 10.0) Enables Unauthorized Session Persistence

2 min read
admin
April 15, 2025
A critical security vulnerability has been disclosed in the Apache Roller open-source, Java-based blogging server software that...
admin
April 15, 2025
Everybody knows browser extensions are embedded into nearly every user’s daily workflow, from spell checkers to GenAI...
admin
April 15, 2025
Cybersecurity researchers have disclosed a malicious package uploaded to the Python Package Index (PyPI) repository that's designed...
admin
April 15, 2025
The North Korea-linked threat actor assessed to be behind the massive Bybit hack in February 2025 has...
Gladinet’s Triofox and CentreStack Under Active Exploitation via Critical RCE Vulnerability

2 min read
admin
April 15, 2025
A recently disclosed security flaw in Gladinet CentreStack also impacts its Triofox remote access and collaboration solution,...
admin
April 15, 2025
Meta has announced that it will begin to train its artificial intelligence (AI) models using public data...
admin
April 14, 2025
Attackers aren’t waiting for patches anymore — they are breaking in before defenses are ready. Trusted security...
admin
April 14, 2025
Cybersecurity researchers have discovered a new, sophisticated remote access trojan called ResolverRAT that has been observed in...
Phishing Campaigns Use Real-Time Checks to Validate Victim Emails Before Credential Theft

3 min read
admin
April 14, 2025
Cybersecurity researchers are calling attention to a new type of credential phishing scheme that ensures that the...
admin
April 14, 2025
AI is changing cybersecurity faster than many defenders realize. Attackers are already using AI to automate reconnaissance,...
admin
April 14, 2025
A threat actor with ties to Pakistan has been observed targeting various sectors in India with various...
Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit

2 min read
admin
April 11, 2025
Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate...