admin
August 14, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting N-able N-central...
admin
August 13, 2025
Cybersecurity researchers have discovered a new malvertising campaign that's designed to infect victims with a multi-stage malware...
Zoom and Xerox Release Critical Security Updates Fixing Privilege Escalation and RCE Flaws

1 min read
admin
August 13, 2025
Zoom and Xerox have addressed critical security flaws in Zoom Clients for Windows and FreeFlow Core that...
admin
August 13, 2025
Cybersecurity researchers have discovered a new campaign that employs a previously undocumented ransomware family called Charon to...
Fortinet Warns About FortiSIEM Vulnerability (CVE-2025-25256) With In-the-Wild Exploit Code

1 min read
admin
August 13, 2025
Fortinet is alerting customers of a critical security flaw in FortiSIEM for which it said there exists...
admin
August 13, 2025
Security operations have never been a 9-to-5 job. For SOC analysts, the day often starts and ends...
admin
August 13, 2025
The AI revolution isn’t coming. It’s already here. From copilots that write our emails to autonomous agents...
admin
August 13, 2025
Microsoft on Tuesday rolled out fixes for a massive set of 111 security flaws across its software...
Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks

3 min read
admin
August 12, 2025
New research has uncovered Docker images on Docker Hub that contain the infamous XZ Utils backdoor, more...
admin
August 12, 2025
Most security tools can’t see what happens inside the browser, but that’s where the majority of work,...
admin
August 12, 2025
Cybersecurity researchers are warning of a "significant spike" in brute-force traffic aimed at Fortinet SSL VPN devices.
The...
Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses

3 min read
admin
August 12, 2025
An ongoing data extortion campaign targeting Salesforce customers may soon turn its attention to financial services and...
admin
August 12, 2025
A previously undocumented threat actor dubbed Curly COMrades has been observed targeting entities in Georgia and Moldova...
Dutch NCSC Confirms Active Exploitation of Citrix NetScaler CVE-2025-6543 in Critical Sectors

2 min read
admin
August 12, 2025
The Dutch National Cyber Security Centre (NCSC-NL) has warned of cyber attacks exploiting a recently disclosed critical...
⚡ Weekly Recap: BadCam Attack, WinRAR 0-Day, EDR Killer, NVIDIA Flaws, Ransomware Attacks & More

21 min read
admin
August 11, 2025
This week, cyber attackers are moving quickly, and businesses need to stay alert. They’re finding new weaknesses...
admin
August 11, 2025
Cybersecurity researchers have discovered a fresh set of security issues in the Terrestrial Trunked Radio (TETRA) communications...
admin
August 11, 2025
Malicious actors have been observed exploiting a now-patched critical security flaw impacting Erlang/Open Telecom Platform (OTP) SSH...
admin
August 11, 2025
The maintainers of the WinRAR file archiving utility have released an update to address an actively exploited...
admin
August 11, 2025
The Evolution of Exposure Management
Most security teams have a good sense of what’s critical in their environment....
New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP

3 min read
admin
August 10, 2025
A novel attack technique could be weaponized to rope thousands of public domain controllers (DCs) around the...