admin
May 29, 2025
Fake installers for popular artificial intelligence (AI) tools like OpenAI ChatGPT and InVideo AI are being used...
admin
May 29, 2025
Cybersecurity researchers have taken the wraps off an unusual cyber attack that leveraged malware with corrupted DOS...
admin
May 29, 2025
Google on Wednesday disclosed that the Chinese state-sponsored threat actor known as APT41 leveraged a malware called...
admin
May 29, 2025
The threat actors behind the DragonForce ransomware gained access to an unnamed Managed Service Provider's (MSP) SimpleHelp...
Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin

2 min read
admin
May 29, 2025
Cybersecurity researchers have disclosed a critical unpatched security flaw impacting TI WooCommerce Wishlist plugin for WordPress that...
admin
May 28, 2025
Stealer malware no longer just steals passwords. In 2025, it steals live sessions—and attackers are moving faster...
admin
May 28, 2025
An Iranian national has pleaded guilty in the U.S. over his involvement in an international ransomware and...
admin
May 28, 2025
The Czech Republic on Wednesday formally accused a threat actor associated with the People's Republic of China...
admin
May 28, 2025
Cybersecurity researchers have discovered a security flaw in Microsoft's OneDrive File Picker that, if successfully exploited, could...
admin
May 28, 2025
Embedded Linux-based Internet of Things (IoT) devices have become the target of a new botnet dubbed PumaBot.
Written...
admin
May 28, 2025
A financially motivated threat actor has been observed exploiting a recently disclosed remote code execution flaw affecting...
admin
May 28, 2025
Would you expect an end user to log on to a cybercriminal’s computer, open their browser, and...
251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch

2 min read
admin
May 28, 2025
Cybersecurity researchers have disclosed details of a coordinated cloud-based scanning activity that targeted 75 distinct "exposure points"...
admin
May 28, 2025
Apple on Tuesday revealed that it prevented over $9 billion in fraudulent transactions in the last five...
admin
May 27, 2025
Microsoft has shed light on a previously undocumented cluster of malicious activity originating from a Russia-affiliated threat...
admin
May 27, 2025
Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub Copilot’s code completions to chatbots that...
admin
May 27, 2025
Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into...
admin
May 27, 2025
Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques...
Hackers Are Calling Your Office: FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign

3 min read
admin
May 27, 2025
The U.S. Federal Bureau of Investigation (FBI) has warned of social engineering attacks mounted by a criminal...
admin
May 27, 2025
The Russia-aligned threat actor known as TAG-110 has been observed conducting a spear-phishing campaign targeting Tajikistan using...