admin
December 2, 2025
Cybersecurity researchers have disclosed details of an npm package that attempts to influence artificial intelligence (AI)-driven security...
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks
4 min read
admin
December 2, 2025
Israeli entities spanning academia, engineering, local government, manufacturing, technology, transportation, and utilities sectors have emerged as the...
admin
December 2, 2025
Vulnerability management is a core component of every cybersecurity strategy. However, businesses often use thousands of software...
admin
December 2, 2025
Google on Monday released monthly security updates for the Android operating system, including two vulnerabilities that it...
admin
December 2, 2025
India's telecommunications ministry has reportedly asked major mobile device manufacturers to preload a government-backed cybersecurity app named...
admin
December 2, 2025
A threat actor known as ShadyPanda has been linked to a seven-year-long browser extension campaign that has...
Webinar: The “Agentic” Trojan Horse: Why the New AI Browsers War is a Nightmare for Security Teams
5 min read
admin
December 1, 2025
The AI browser wars are coming to a desktop near you, and you need to start worrying...
admin
December 1, 2025
Hackers aren’t kicking down the door anymore. They just use the same tools we use every day...
admin
December 1, 2025
A new Android malware named Albiriox has been advertised under a malware-as-a-service (MaaS) model to offer a...
Tomiris Shifts to Public-Service Implants for Stealthier C2 in Attacks on Government Targets
4 min read
admin
December 1, 2025
The threat actor known as Tomiris has been attributed to attacks targeting foreign ministries, intergovernmental organizations, and...
admin
November 30, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) catalog to...
admin
November 28, 2025
Cybersecurity researchers have discovered vulnerable code in legacy Python packages that could potentially pave the way for...
admin
November 28, 2025
The North Korean threat actors behind the Contagious Interview campaign have continued to flood the npm registry...
admin
November 28, 2025
As IT environments become increasingly distributed and organizations adopt hybrid and remote work at scale, traditional perimeter-based...
admin
November 28, 2025
Cybersecurity researchers have shed light on a cross-tenant blind spot that allows attackers to bypass Microsoft Defender...
admin
November 27, 2025
The threat actor known as Bloody Wolf has been attributed to a cyber attack campaign that has...
admin
November 27, 2025
Microsoft has announced plans to improve the security of Entra ID authentication by blocking unauthorized script injection...
ThreatsDay Bulletin: AI Malware, Voice Bot Flaws, Crypto Laundering, IoT Attacks — and 20 More Stories
14 min read
admin
November 27, 2025
Hackers have been busy again this week. From fake voice calls and AI-powered malware to huge money-laundering...
admin
November 27, 2025
Gainsight has disclosed that the recent suspicious activity targeting its applications has affected more customers than previously...
admin
November 26, 2025
The second wave of the Shai-Hulud supply chain attack has spilled over to the Maven ecosystem after...
