admin
May 14, 2025
A cyber espionage group known as Earth Ammit has been linked to two related but distinct campaigns...
admin
May 14, 2025
Organizations across industries are experiencing significant escalations in cyberattacks, particularly targeting critical infrastructure providers and cloud-based enterprises....
admin
May 14, 2025
Cybersecurity researchers have discovered a new phishing campaign that's being used to distribute malware called Horabot targeting...
admin
May 14, 2025
Microsoft on Tuesday shipped fixes to address a total of 78 security flaws across its software lineup,...
admin
May 14, 2025
Fortinet has patched a critical security flaw that it said has been exploited as a zero-day in...
Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks

2 min read
admin
May 14, 2025
Ivanti has released security updates to address two security flaws in Endpoint Manager Mobile (EPMM) software that...
admin
May 13, 2025
A recently disclosed critical security flaw impacting SAP NetWeaver is being exploited by multiple China-nexus nation-state actors...
admin
May 13, 2025
Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that purports to...
Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers

3 min read
admin
May 13, 2025
A Türkiye-affiliated threat actor exploited a zero-day security flaw in an Indian enterprise communication platform called Output...
admin
May 13, 2025
The cybersecurity landscape has been dramatically reshaped by the advent of generative AI. Attackers now leverage large...
admin
May 13, 2025
The North Korea-linked threat actor known as Konni APT has been attributed to a phishing campaign targeting...
admin
May 13, 2025
Moldovan law enforcement authorities have arrested a 45-year-old foreign man suspected of involvement in a series of...
admin
May 12, 2025
ASUS has released updates to address two security flaws impacting ASUS DriverHub that, if successfully exploited, could...
admin
May 12, 2025
What do a source code editor, a smart billboard, and a web server have in common? They’ve...
admin
May 12, 2025
Detecting leaked credentials is only half the battle. The real challenge—and often the neglected half of the...
admin
May 12, 2025
Threat actors have been observed leveraging fake artificial intelligence (AI)-powered tools as a lure to entice users...
Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection

2 min read
admin
May 10, 2025
Google has agreed to pay the U.S. state of Texas nearly $1.4 billion to settle two lawsuits...
admin
May 10, 2025
Germany's Federal Criminal Police Office (aka Bundeskriminalamt or BKA) has seized the online infrastructure and shutdown linked...
BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation

4 min read
admin
May 9, 2025
A joint law enforcement operation undertaken by Dutch and U.S. authorities has dismantled a criminal proxy network...
admin
May 9, 2025
The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of...