admin
August 27, 2025
A threat activity cluster known as ShadowSilk has been attributed to a fresh set of attacks targeting...
admin
August 27, 2025
Employees are experimenting with AI at record speed. They are drafting emails, analyzing data, and transforming the...
admin
August 27, 2025
A widespread data theft campaign has allowed hackers to breach sales automation platform Salesloft to steal OAuth...
Blind Eagle’s Five Clusters Target Colombia Using RATs, Phishing Lures, and Dynamic DNS Infra

4 min read
admin
August 27, 2025
Cybersecurity researchers have discovered five distinct activity clusters linked to a persistent threat actor known as Blind...
admin
August 26, 2025
Citrix has released fixes to address three security flaws in NetScaler ADC and NetScaler Gateway, including one...
admin
August 26, 2025
A team of academics has devised a novel attack that can be used to downgrade a 5G...
admin
August 26, 2025
Cybersecurity researchers are calling attention to a sophisticated social engineering campaign that's targeting supply chain-critical manufacturing companies...
admin
August 26, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws impacting Citrix Session...
admin
August 26, 2025
Cybersecurity researchers have discovered a new variant of an Android banking trojan called HOOK that features ransomware-style...
admin
August 26, 2025
Google has announced plans to begin verifying the identity of all developers who distribute apps on Android,...
admin
August 26, 2025
Docker has released fixes to address a critical security flaw affecting the Docker Desktop app for Windows...
UNC6384 Deploys PlugX via Captive Portal Hijacks and Valid Certificates Targeting Diplomats

3 min read
admin
August 25, 2025
A China-nexus threat actor known as UNC6384 has been attributed to a set of attacks targeting diplomats...
admin
August 25, 2025
Security Information and Event Management (SIEM) systems act as the primary tools for detecting suspicious activity in...
admin
August 25, 2025
Cybersecurity researchers have flagged a new phishing campaign that's using fake voicemails and purchase orders to deliver...
⚡ Weekly Recap: Password Manager Flaws, Apple 0-Day, Hidden AI Prompts, In-the-Wild Exploits & More

23 min read
admin
August 25, 2025
Cybersecurity today moves at the pace of global politics. A single breach can ripple across supply chains,...
admin
August 25, 2025
The advanced persistent threat (APT) actor known as Transparent Tribe has been observed targeting both Windows and...
admin
August 24, 2025
Cybersecurity researchers have discovered a malicious Go module that presents itself as a brute-force tool for SSH...
admin
August 23, 2025
Cybersecurity researchers are calling attention to multiple campaigns that leverage known security vulnerabilities and expose Redis servers...
admin
August 22, 2025
Cybersecurity researchers have shed light on a novel attack chain that employs phishing emails to deliver an...
admin
August 22, 2025
Pentesting remains one of the most effective ways to identify real-world security weaknesses before adversaries do. But...