admin
April 23, 2025
The Iran-nexus threat actor known as UNC2428 has been observed delivering a backdoor known as MURKYTOUR as...
admin
April 23, 2025
Cybersecurity researchers have revealed that Russian military personnel are the target of a new malicious campaign that...
admin
April 23, 2025
Phishing attacks remain a huge challenge for organizations in 2025. In fact, with attackers increasingly leveraging identity-based...
admin
April 23, 2025
Multiple suspected Russia-linked threat actors are "aggressively" targeting individuals and organizations with ties to Ukraine and human...
Ripple’s xrpl.js npm Package Backdoored to Steal Private Keys in Major Supply Chain Attack
2 min read
admin
April 23, 2025
The Ripple cryptocurrency npm JavaScript library named xrpl.js has been compromised by unknown threat actors as part...
admin
April 23, 2025
Google on Tuesday revealed that it will no longer offer a standalone prompt for third-party cookies in...
admin
April 22, 2025
Cybersecurity researchers have detailed a malware campaign that's targeting Docker environments with a previously undocumented technique to...
admin
April 22, 2025
Cybersecurity researchers have detailed a now-patched vulnerability in Google Cloud Platform (GCP) that could have enabled an...
admin
April 22, 2025
As SaaS and cloud-native work reshape the enterprise, the web browser has emerged as the new endpoint....
admin
April 22, 2025
In what has been described as an "extremely sophisticated phishing attack," threat actors have leveraged an uncommon...
admin
April 22, 2025
Microsoft on Monday announced that it has moved the Microsoft Account (MSA) signing service to Azure confidential...
admin
April 22, 2025
The China-linked cyber espionage group tracked as Lotus Panda has been attributed to a campaign that compromised...
admin
April 21, 2025
Cybersecurity researchers have flagged a new malicious campaign related to the North Korean state-sponsored threat actor known...
admin
April 21, 2025
A new Android malware-as-a-service (MaaS) platform named SuperCard X can facilitate near-field communication (NFC) relay attacks, enabling...
admin
April 21, 2025
The problem is simple: all breaches start with initial access, and initial access comes down to two...
admin
April 21, 2025
Can a harmless click really lead to a full-blown cyberattack?
Surprisingly, yes — and that’s exactly what we...
admin
April 21, 2025
Cybersecurity researchers have disclosed a surge in "mass scanning, credential brute-forcing, and exploitation attempts" originating from IP...
APT29 Deploys GRAPELOADER Malware Targeting European Diplomats Through Wine-Tasting Lures
4 min read
admin
April 20, 2025
The Russian state-sponsored threat actor known as APT29 has been linked to an advanced phishing campaign that's...
admin
April 19, 2025
Cybersecurity researchers have uncovered three malicious packages in the npm registry that masquerade as a popular Telegram...
admin
April 19, 2025
ASUS has disclosed a critical security flaw impacting routers with AiCloud enabled that could permit remote attackers...
