admin
July 21, 2025
By 2025, Zero Trust has evolved from a conceptual framework into an essential pillar of modern security....
admin
July 21, 2025
Cybersecurity researchers have disclosed a novel attack technique that allows threat actors to downgrade Fast IDentity Online...
Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks

4 min read
admin
July 21, 2025
Microsoft on Sunday released security patches for an actively exploited security flaw in SharePoint and also released...
admin
July 21, 2025
Hewlett-Packard Enterprise (HPE) has released security updates to address a critical security flaw affecting Instant On Access...
3,500 Websites Hijacked to Secretly Mine Crypto Using Stealth JavaScript and WebSocket Tactics

3 min read
admin
July 21, 2025
A new attack campaign has compromised more than 3,500 websites worldwide with JavaScript cryptocurrency miners, marking the...
EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware

3 min read
admin
July 20, 2025
The financially motivated threat actor known as EncryptHub (aka LARVA-208 and Water Gamayun) has been attributed to...
Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations

3 min read
admin
July 20, 2025
A critical security vulnerability in Microsoft SharePoint Server has been weaponized as part of an "active, large-scale"...
admin
July 20, 2025
Cybersecurity researchers have alerted to a supply chain attack that has targeted popular npm packages via a...
admin
July 20, 2025
A newly disclosed critical security flaw in CrushFTP has come under active exploitation in the wild. Assigned...
China’s Massistant Tool Secretly Extracts SMS, GPS Data, and Images From Confiscated Phones

3 min read
admin
July 18, 2025
Cybersecurity researchers have shed light on a mobile forensics tool called Massistant that's used by law enforcement...
admin
July 18, 2025
Multiple sectors in China, Hong Kong, and Pakistan have become the target of a threat activity cluster...
Ivanti Zero-Days Exploited to Drop MDifyLoader and Launch In-Memory Cobalt Strike Attacks

2 min read
admin
July 18, 2025
Cybersecurity researchers have disclosed details of a new malware called MDifyLoader that has been observed in conjunction...
admin
July 18, 2025
Google on Thursday revealed it's pursuing legal action in New York federal court against 25 unnamed individuals...
admin
July 18, 2025
Cybersecurity researchers have disclosed a critical container escape vulnerability in the NVIDIA Container Toolkit that could pose...
From Backup to Cyber Resilience: Why IT Leaders Must Rethink Backup in the Age of Ransomware

7 min read
admin
July 18, 2025
With IT outages and disruptions escalating, IT teams are shifting their focus beyond simply backing up data...
Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters

4 min read
admin
July 18, 2025
Threat actors are leveraging public GitHub repositories to host malicious payloads and distribute them via Amadey as...
admin
July 17, 2025
Cybersecurity researchers have discovered a new campaign that exploits a known security flaw impacting Apache HTTP Server...
admin
July 17, 2025
An international operation coordinated by Europol has disrupted the infrastructure of a pro-Russian hacktivist group known as...
admin
July 17, 2025
The modern-day threat landscape requires enterprise security teams to think and act beyond traditional cybersecurity measures that...
Chinese Hackers Target Taiwan’s Semiconductor Sector with Cobalt Strike, Custom Backdoors

5 min read
admin
July 17, 2025
The Taiwanese semiconductor industry has become the target of spear-phishing campaigns undertaken by three Chinese state-sponsored threat...