Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses
3 min read
admin
August 12, 2025
An ongoing data extortion campaign targeting Salesforce customers may soon turn its attention to financial services and...
admin
August 12, 2025
A previously undocumented threat actor dubbed Curly COMrades has been observed targeting entities in Georgia and Moldova...
Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors
2 min read
admin
August 12, 2025
The Dutch National Cyber Security Centre (NCSC-NL) has warned of cyber attacks exploiting a recently disclosed critical...
⚡ Weekly Recap: BadCam Attack, WinRAR 0-Day, EDR Killer, NVIDIA Flaws, Ransomware Attacks & More
21 min read
admin
August 11, 2025
This week, cyber attackers are moving quickly, and businesses need to stay alert. They’re finding new weaknesses...
admin
August 11, 2025
Cybersecurity researchers have discovered a fresh set of security issues in the Terrestrial Trunked Radio (TETRA) communications...
admin
August 11, 2025
Malicious actors have been observed exploiting a now-patched critical security flaw impacting Erlang/Open Telecom Platform (OTP) SSH...
admin
August 11, 2025
The maintainers of the WinRAR file archiving utility have released an update to address an actively exploited...
admin
August 11, 2025
The Evolution of Exposure Management
Most security teams have a good sense of what’s critical in their environment....
New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP
3 min read
admin
August 10, 2025
A novel attack technique could be weaponized to rope thousands of public domain controllers (DCs) around the...
Researchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation
4 min read
admin
August 10, 2025
Cybersecurity researchers have presented new findings related to a now-patched security issue in Microsoft's Windows Remote Procedure...
admin
August 9, 2025
Cybersecurity researchers have disclosed vulnerabilities in select model webcams from Lenovo that could turn them into BadUSB...
Researchers Uncover GPT-5 Jailbreak and Zero-Click AI Agent Attacks Exposing Cloud and IoT Systems
4 min read
admin
August 9, 2025
Cybersecurity researchers have uncovered a jailbreak technique to bypass ethical guardrails erected by OpenAI in its latest...
admin
August 9, 2025
Cybersecurity researchers have discovered over a dozen vulnerabilities in enterprise secure vaults from CyberArk and HashiCorp that,...
AI Tools Fuel Brazilian Phishing Scam While Efimer Trojan Steals Crypto from 5,000 Victims
4 min read
admin
August 8, 2025
Cybersecurity researchers are drawing attention to a new campaign that's using legitimate generative artificial intelligence (AI)-powered website...
admin
August 8, 2025
When an organization’s credentials are leaked, the immediate consequences are rarely visible—but the long-term impact is far-reaching....
RubyGems, PyPI Hit by Malicious Packages Stealing Credentials, Crypto, Forcing Security Changes
3 min read
admin
August 8, 2025
A fresh set of 60 malicious packages has been uncovered targeting the RubyGems ecosystem by posing as...
admin
August 8, 2025
A newly discovered campaign dubbed GreedyBear has leveraged over 150 malicious extensions to the Firefox marketplace that...
SocGholish Malware Spread via Ad Tools; Delivers Access to LockBit, Evil Corp, and Others
3 min read
admin
August 7, 2025
The threat actors behind the SocGholish malware have been observed leveraging Traffic Distribution Systems (TDSs) like Parrot...
admin
August 7, 2025
Microsoft has released an advisory for a high-severity security flaw affecting on-premise versions of Exchange Server that...
admin
August 7, 2025
Now that we are well into 2025, cloud attacks are evolving faster than ever and artificial intelligence...
