China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones

3 min read
admin
July 18, 2025
Cybersecurity researchers have shed light on a mobile forensics tool called Massistant that's used by law enforcement...
admin
July 18, 2025
Multiple sectors in China, Hong Kong, and Pakistan have become the target of a threat activity cluster...
Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks

2 min read
admin
July 18, 2025
Cybersecurity researchers have disclosed details of a new malware called MDifyLoader that has been observed in conjunction...
admin
July 18, 2025
Google on Thursday revealed it's pursuing legal action in New York federal court against 25 unnamed individuals...
admin
July 18, 2025
Cybersecurity researchers have disclosed a critical container escape vulnerability in the NVIDIA Container Toolkit that could pose...
From Backup to Cyber Resilience: Why IT Leaders Must Rethink Backup in the Age of Ransomware

7 min read
admin
July 18, 2025
With IT outages and disruptions escalating, IT teams are shifting their focus beyond simply backing up data...
Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

4 min read
admin
July 18, 2025
Threat actors are leveraging public GitHub repositories to host malicious payloads and distribute them via Amadey as...
admin
July 17, 2025
Cybersecurity researchers have discovered a new campaign that exploits a known security flaw impacting Apache HTTP Server...
admin
July 17, 2025
An international operation coordinated by Europol has disrupted the infrastructure of a pro-Russian hacktivist group known as...
admin
July 17, 2025
The modern-day threat landscape requires enterprise security teams to think and act beyond traditional cybersecurity measures that...
Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors

5 min read
admin
July 17, 2025
The Taiwanese semiconductor industry has become the target of spear-phishing campaigns undertaken by three Chinese state-sponsored threat...
admin
July 17, 2025
Cisco has disclosed a new maximum-severity security vulnerability impacting Identity Services Engine (ISE) and Cisco ISE Passive...
admin
July 16, 2025
Cybersecurity researchers have disclosed what they say is a "critical design flaw" in delegated Managed Service Accounts...
admin
July 16, 2025
The AI gold rush is on. But without identity-first security, every deployment becomes an open door. Most...
admin
July 16, 2025
Cybersecurity researchers have flagged a new variant of a known malware loader called Matanbuchus that packs in...
admin
July 16, 2025
A threat activity cluster has been observed targeting fully-patched end-of-life SonicWall Secure Mobile Access (SMA) 100 series...
admin
July 16, 2025
Cybersecurity researchers have discovered a new, sophisticated variant of a known Android malware referred to as Konfety...
Urgent: Google Releases Critical Chrome Update for CVE-2025-6558 Exploit Active in the Wild

2 min read
admin
July 16, 2025
Google on Tuesday rolled out fixes for six security issues in its Chrome web browser, including one...
Deepfakes. Fake Recruiters. Cloned CFOs — Learn How to Stop AI-Driven Attacks in Real Time

2 min read
admin
July 16, 2025
Social engineering attacks have entered a new era—and they’re coming fast, smart, and deeply personalized.
It’s no longer...
Google AI “Big Sleep” Stops Exploitation of Critical SQLite Vulnerability Before Hackers Act

3 min read
admin
July 16, 2025
Google on Tuesday revealed that its large language model (LLM)-assisted vulnerability discovery framework discovered a security flaw...