admin
May 22, 2025
A Chinese-speaking threat actor tracked as UAT-6382 has been linked to the exploitation of a now-patched remote-code-execution...
admin
May 22, 2025
A privilege escalation flaw has been demonstrated in Windows Server 2025 that makes it possible for attackers...
admin
May 22, 2025
A recently patched pair of security flaws affecting Ivanti Endpoint Manager Mobile (EPMM) software has been exploited...
admin
May 22, 2025
For many organizations, identity security appears to be under control. On paper, everything checks out. But new...
admin
May 22, 2025
A sprawling operation undertaken by global law enforcement agencies and a consortium of private sector firms has...
admin
May 21, 2025
Russian cyber threat actors have been attributed to a state-sponsored campaign targeting Western logistics entities and technology...
admin
May 21, 2025
Continuous Integration and Continuous Delivery/Deployment (CI/CD) refers to practices that automate how code is developed and released...
admin
May 21, 2025
Russian organizations have become the target of a phishing campaign that distributes malware called PureRAT, according to...
admin
May 21, 2025
Counterfeit Facebook pages and sponsored ads on the social media platform are being employed to direct users...
admin
May 21, 2025
It takes just one email to compromise an entire system. A single well-crafted message can bypass filters,...
admin
May 21, 2025
Cybersecurity researchers have discovered a new campaign that employs malicious JavaScript injections to redirect site visitors on...
admin
May 21, 2025
Google has announced a new feature in its Chrome browser that lets its built-in Password Manager automatically...
admin
May 20, 2025
A threat actor known as Hazy Hawk has been observed hijacking abandoned cloud resources of high-profile organizations,...
100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads

3 min read
admin
May 20, 2025
An unknown threat actor has been attributed to creating several malicious Chrome Browser extensions since February 2024...
admin
May 20, 2025
Cybersecurity researchers have discovered risky default identity and access management (IAM) roles impacting Amazon Web Services that...
admin
May 20, 2025
Cybersecurity researchers have uncovered malicious packages uploaded to the Python Package Index (PyPI) repository that act as...
admin
May 20, 2025
In the newly released 2025 State of Pentesting Report, Pentera surveyed 500 CISOs from global enterprises (200...
admin
May 20, 2025
Threat hunters have exposed the tactics of a China-aligned threat actor called UnsolicitedBooker that targeted an unnamed...
admin
May 20, 2025
Cybersecurity researchers are calling attention to a new Linux cryptojacking campaign that's targeting publicly accessible Redis servers.
The...
admin
May 19, 2025
The official site for RVTools has been hacked to serve a compromised installer for the popular VMware...