admin
August 4, 2025
Some of the most devastating cyberattacks don’t rely on brute force, but instead succeed through stealth. These...
CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign
4 min read
admin
August 2, 2025
Telecommunications organizations in Southeast Asia have been targeted by a state-sponsored threat actor known as CL-STA-0969 to...
admin
August 2, 2025
Cybersecurity researchers have flagged a previously undocumented Linux backdoor dubbed Plague that has managed to evade detection...
Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
2 min read
admin
August 2, 2025
SonicWall SSL VPN devices have become the target of Akira ransomware attacks as part of a newfound...
admin
August 1, 2025
Cybersecurity researchers have disclosed a now-patched, high-severity security flaw in Cursor, a popular artificial intelligence (AI) code...
admin
August 1, 2025
Cybersecurity researchers have detailed a new cluster of activity where threat actors are impersonating enterprises with fake...
admin
August 1, 2025
Cybersecurity researchers have flagged a malicious npm package that was generated using artificial intelligence (AI) and concealed...
You Are What You Eat: Why Your AI Security Tools Are Only as Strong as the Data You Feed Them
6 min read
admin
August 1, 2025
Just as triathletes know that peak performance requires more than expensive gear, cybersecurity teams are discovering that...
admin
August 1, 2025
The threat actor linked to the exploitation of the recently disclosed security flaws in Microsoft SharePoint Server...
admin
August 1, 2025
The Russian nation-state threat actor known as Secret Blizzard has been observed orchestrating a new cyber espionage...
admin
July 31, 2025
Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically...
admin
July 31, 2025
Cybersecurity researchers have disclosed details of a new phishing campaign that conceals malicious payloads by abusing link...
N. Korean Hackers Used Job Lures, Cloud Account Access, and Malware to Steal Millions in Crypto
3 min read
admin
July 31, 2025
The North Korea-linked threat actor known as UNC4899 has been attributed to attacks targeting two different organizations...
admin
July 31, 2025
The financially motivated threat actor known as UNC2891 has been observed targeting Automatic Teller Machine (ATM) infrastructure...
admin
July 31, 2025
Security Operations Centers (SOCs) are stretched to their limits. Log volumes are surging, threat landscapes are growing...
admin
July 31, 2025
Threat actors are actively exploiting a critical security flaw in "Alone – Charity Multipurpose Non-profit WordPress Theme"...
admin
July 30, 2025
Cybersecurity researchers are calling attention to an ongoing campaign that distributes fake cryptocurrency trading apps to deploy...
admin
July 30, 2025
Cybersecurity experts have released a decryptor for a ransomware strain called FunkSec, allowing victims to recover access...
admin
July 30, 2025
Chinese companies linked to the state-sponsored hacking group known as Silk Typhoon (aka Hafnium) have been identified...
admin
July 30, 2025
In this article, we will provide a brief overview of Pillar Security's platform to better understand how...
