admin
April 30, 2025
A China-aligned advanced persistent threat (APT) group called TheWizards has been linked to a lateral movement tool...
admin
April 30, 2025
As the field of artificial intelligence (AI) continues to evolve at a rapid pace, new research has...
admin
April 30, 2025
Everyone has cybersecurity stories involving family members. Here’s a relatively common one. The conversation usually goes something...
admin
April 30, 2025
Cybersecurity researchers have revealed that RansomHub's online infrastructure has "inexplicably" gone offline as of April 1, 2025,...
Meta Launches LlamaFirewall Framework to Stop AI Jailbreaks, Injections, and Insecure Code

2 min read
admin
April 30, 2025
Meta on Tuesday announced LlamaFirewall, an open-source framework designed to secure artificial intelligence (AI) systems against emerging...
admin
April 30, 2025
A high court in the Indian state of Karnataka has ordered the blocking of end-to-end encrypted email...
WhatsApp Launches Private Processing to Enable AI Features While Protecting Message Privacy

3 min read
admin
April 29, 2025
Popular messaging app WhatsApp on Tuesday unveiled a new technology called Private Processing to enable artificial intelligence...
admin
April 29, 2025
Various generative artificial intelligence (GenAI) services have been found vulnerable to two types of jailbreak attacks that...
admin
April 29, 2025
Cybersecurity company SentinelOne has revealed that a China-nexus threat cluster dubbed PurpleHaze conducted reconnaissance attempts against its...
admin
April 29, 2025
In a new campaign detected in March 2025, senior members of the World Uyghur Congress (WUC) living...
admin
April 29, 2025
Find out how Reco keeps Microsoft 365 Copilot safe by spotting risky prompts, protecting data, managing user...
Google Reports 75 Zero-Days Exploited in 2024 — 44% Targeted Enterprise Security Products

3 min read
admin
April 29, 2025
Google has revealed that it observed 75 zero-day vulnerabilities exploited in the wild in 2024, down from...
admin
April 29, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two high-severity security flaws impacting Broadcom...
⚡ Weekly Recap: Critical SAP Exploit, AI-Powered Phishing, Major Breaches, New CVEs & More

20 min read
admin
April 28, 2025
What happens when cybercriminals no longer need deep skills to breach your defenses? Today’s attackers are armed...
admin
April 28, 2025
Not every security vulnerability is high risk on its own - but in the hands of an...
admin
April 28, 2025
Government and telecommunications sectors in Southeast Asia have become the target of a "sophisticated" campaign undertaken by...
admin
April 28, 2025
Cybersecurity researchers are warning about a large-scale phishing campaign targeting WooCommerce users with a fake security alert...
admin
April 28, 2025
Threat actors have been observed exploiting two newly disclosed critical security flaws in Craft CMS in zero-day...
Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers

2 min read
admin
April 27, 2025
Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying attacks against...
admin
April 26, 2025
Cybersecurity researchers have detailed the activities of an initial access broker (IAB) dubbed ToyMaker that has been...