admin
May 28, 2025
Embedded Linux-based Internet of Things (IoT) devices have become the target of a new botnet dubbed PumaBot.
Written...
admin
May 28, 2025
A financially motivated threat actor has been observed exploiting a recently disclosed remote code execution flaw affecting...
admin
May 28, 2025
Would you expect an end user to log on to a cybercriminal’s computer, open their browser, and...
251 Amazon-Hosted IPs Used in Exploit Scan Targeting ColdFusion, Struts, and Elasticsearch
2 min read
admin
May 28, 2025
Cybersecurity researchers have disclosed details of a coordinated cloud-based scanning activity that targeted 75 distinct "exposure points"...
admin
May 28, 2025
Apple on Tuesday revealed that it prevented over $9 billion in fraudulent transactions in the last five...
admin
May 27, 2025
Microsoft has shed light on a previously undocumented cluster of malicious activity originating from a Russia-affiliated threat...
admin
May 27, 2025
Artificial intelligence is driving a massive shift in enterprise productivity, from GitHub Copilot’s code completions to chatbots that...
admin
May 27, 2025
Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into...
admin
May 27, 2025
Threat hunters have exposed a novel campaign that makes use of search engine optimization (SEO) poisoning techniques...
Hackers Are Calling Your Office: FBI Alerts Law Firms to Luna Moth’s Stealth Phishing Campaign
3 min read
admin
May 27, 2025
The U.S. Federal Bureau of Investigation (FBI) has warned of social engineering attacks mounted by a criminal...
admin
May 27, 2025
The Russia-aligned threat actor known as TAG-110 has been observed conducting a spear-phishing campaign targeting Tajikistan using...
admin
May 26, 2025
Are your web privacy controls protecting your users, or just a box-ticking exercise? This CISO’s guide provides...
admin
May 26, 2025
As many as 60 malicious npm packages have been discovered in the package registry with malicious functionality...
⚡ Weekly Recap: APT Campaigns, Browser Hijacks, AI Malware, Cloud Breaches and Critical CVEs
18 min read
admin
May 26, 2025
Cyber threats don't show up one at a time anymore. They’re layered, planned, and often stay hidden...
admin
May 25, 2025
Cybersecurity researchers have disclosed a malware campaign that uses fake software installers masquerading as popular tools like...
admin
May 24, 2025
The malware known as Latrodectus has become the latest to embrace the widely-used social engineering technique called...
admin
May 23, 2025
Cybersecurity researchers have disclosed that a threat actor codenamed ViciousTrap has compromised nearly 5,300 unique network edge...
admin
May 23, 2025
As part of the latest "season" of Operation Endgame, a coalition of law enforcement agencies have taken...
SafeLine WAF: Open Source Web Application Firewall with Zero-Day Detection and Bot Protection
4 min read
admin
May 23, 2025
From zero-day exploits to large-scale bot attacks — the demand for a powerful, self-hosted, and user-friendly web...
admin
May 23, 2025
The U.S. Department of Justice (DoJ) on Thursday announced the disruption of the online infrastructure associated with...
