admin
September 4, 2025
The Russian state-sponsored hacking group tracked as APT28 has been attributed to a new Microsoft Outlook backdoor...
Cybercriminals Exploit X’s Grok AI to Bypass Ad Protections and Spread Malware to Millions

2 min read
admin
September 4, 2025
Cybersecurity researchers have flagged a new technique that cybercriminals have adopted to bypass social media platform X's...
admin
September 3, 2025
Cybersecurity researchers have discovered two new malicious packages on the npm registry that make use of smart...
admin
September 3, 2025
In January 2025, cybersecurity experts at Wiz Research found that Chinese AI specialist DeepSeek had suffered a...
admin
September 3, 2025
Google has shipped security updates to address 120 security flaws in its Android operating system as part...
admin
September 3, 2025
Threat actors are attempting to leverage a newly released artificial intelligence (AI) offensive security tool called HexStrike...
Iranian Hackers Exploit 100+ Embassy Email Accounts in Global Phishing Targeting Diplomats

2 min read
admin
September 3, 2025
An Iran-nexus group has been linked to a "coordinated" and "multi-wave" spear-phishing campaign targeting the embassies and...
admin
September 2, 2025
The Harsh Truths of AI Adoption
MITs State of AI in Business report revealed that while 40% of...
admin
September 2, 2025
The North Korea-linked threat actor known as the Lazarus Group has been attributed to a social engineering...
admin
September 2, 2025
Cybersecurity researchers have disclosed a stealthy new backdoor called MystRodX that comes with a variety of features...
admin
September 2, 2025
Cybersecurity researchers have flagged a Ukrainian IP network for engaging in massive brute-force and password spraying campaigns...
admin
September 2, 2025
The threat actor known as Silver Fox has been attributed to abuse of a previously unknown vulnerable...
admin
September 2, 2025
Cybersecurity researchers have discovered a malicious npm package that comes with stealthy features to inject malicious code...
admin
September 1, 2025
As enterprises continue to shift their operations to the browser, security teams face a growing set of...
admin
September 1, 2025
Cybersecurity researchers are calling attention to a new shift in the Android malware landscape where dropper apps,...
⚡ Weekly Recap: WhatsApp 0-Day, Docker Bug, Salesforce Breach, Fake CAPTCHAs, Spyware App & More

20 min read
admin
September 1, 2025
Cybersecurity today is less about single attacks and more about chains of small weaknesses that connect into...
ScarCruft Uses RokRAT Malware in Operation HanKook Phantom Targeting South Korean Academics

3 min read
admin
September 1, 2025
Cybersecurity researchers have discovered a new phishing campaign undertaken by the North Korea-linked hacking group called ScarCruft...
admin
August 30, 2025
Cybersecurity researchers have called attention to a cyber attack in which unknown threat actors deployed an open-source...
admin
August 30, 2025
WhatsApp has addressed a security vulnerability in its messaging apps for Apple iOS and macOS that it...
Researchers Warn of Sitecore Exploit Chain Linking Cache Poisoning and Remote Code Execution

2 min read
admin
August 30, 2025
Three new security vulnerabilities have been disclosed in the Sitecore Experience Platform that could be exploited to...