admin
April 25, 2025
North Korea-linked threat actors behind the Contagious Interview have set up front companies as a way to...
admin
April 25, 2025
Threat actors are likely exploiting a new vulnerability in SAP NetWeaver to upload JSP web shells with...
admin
April 25, 2025
When we talk about identity in cybersecurity, most people think of usernames, passwords, and the occasional MFA...
admin
April 25, 2025
Cybersecurity researchers have disclosed three security flaws in the Rack Ruby web server interface that, if successfully...
admin
April 25, 2025
Cybersecurity researchers are warning about a new malware called DslogdRAT that's installed following the exploitation of a...
admin
April 24, 2025
At least six organizations in South Korea have been targeted by the prolific North Korea-linked Lazarus Group...
admin
April 24, 2025
Cybersecurity researchers have demonstrated a proof-of-concept (PoC) rootkit dubbed Curing that leverages a Linux asynchronous I/O mechanism...
admin
April 24, 2025
The Evolving Healthcare Cybersecurity Landscape
Healthcare organizations face unprecedented cybersecurity challenges in 2025. With operational technology (OT) environments...
admin
April 24, 2025
A critical security flaw has been disclosed in the Commvault Command Center that could allow arbitrary code...
admin
April 24, 2025
WhatsApp has introduced an extra layer of privacy called Advanced Chat Privacy that allows users to block...
admin
April 23, 2025
Multiple threat activity clusters with ties to North Korea (aka Democratic People's Republic of Korea or DPRK)...
admin
April 23, 2025
The Iran-nexus threat actor known as UNC2428 has been observed delivering a backdoor known as MURKYTOUR as...
admin
April 23, 2025
Cybersecurity researchers have revealed that Russian military personnel are the target of a new malicious campaign that...
admin
April 23, 2025
Phishing attacks remain a huge challenge for organizations in 2025. In fact, with attackers increasingly leveraging identity-based...
admin
April 23, 2025
Multiple suspected Russia-linked threat actors are "aggressively" targeting individuals and organizations with ties to Ukraine and human...
Ripple’s xrpl.js npm Package Backdoored to Steal Private Keys in Major Supply Chain Attack

2 min read
admin
April 23, 2025
The Ripple cryptocurrency npm JavaScript library named xrpl.js has been compromised by unknown threat actors as part...
admin
April 23, 2025
Google on Tuesday revealed that it will no longer offer a standalone prompt for third-party cookies in...
admin
April 22, 2025
Cybersecurity researchers have detailed a malware campaign that's targeting Docker environments with a previously undocumented technique to...
admin
April 22, 2025
Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud Platform (GCP) that could have enabled an...
admin
April 22, 2025
As SaaS and cloud-native work reshape the enterprise, the web browser has emerged as the new endpoint....