admin
May 14, 2025
Fortinet has patched a critical security flaw that it said has been exploited as a zero-day in...
Ivanti Patches EPMM Vulnerabilities Exploited for Remote Code Execution in Limited Attacks
2 min read
admin
May 14, 2025
Ivanti has released security updates to address two security flaws in Endpoint Manager Mobile (EPMM) software that...
admin
May 13, 2025
A recently disclosed critical security flaw impacting SAP NetWeaver is being exploited by multiple China-nexus nation-state actors...
admin
May 13, 2025
Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that purports to...
Türkiye Hackers Exploited Output Messenger Zero-Day to Drop Golang Backdoors on Kurdish Servers
3 min read
admin
May 13, 2025
A Türkiye-affiliated threat actor exploited a zero-day security flaw in an Indian enterprise communication platform called Output...
admin
May 13, 2025
The cybersecurity landscape has been dramatically reshaped by the advent of generative AI. Attackers now leverage large...
admin
May 13, 2025
The North Korea-linked threat actor known as Konni APT has been attributed to a phishing campaign targeting...
admin
May 13, 2025
Moldovan law enforcement authorities have arrested a 45-year-old foreign man suspected of involvement in a series of...
admin
May 12, 2025
ASUS has released updates to address two security flaws impacting ASUS DriverHub that, if successfully exploited, could...
admin
May 12, 2025
What do a source code editor, a smart billboard, and a web server have in common? They’ve...
admin
May 12, 2025
Detecting leaked credentials is only half the battle. The real challenge—and often the neglected half of the...
admin
May 12, 2025
Threat actors have been observed leveraging fake artificial intelligence (AI)-powered tools as a lure to entice users...
Google Pays $1.375 Billion to Texas Over Unauthorized Tracking and Biometric Data Collection
2 min read
admin
May 10, 2025
Google has agreed to pay the U.S. state of Texas nearly $1.4 billion to settle two lawsuits...
admin
May 10, 2025
Germany's Federal Criminal Police Office (aka Bundeskriminalamt or BKA) has seized the online infrastructure and shutdown linked...
BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
4 min read
admin
May 9, 2025
A joint law enforcement operation undertaken by Dutch and U.S. authorities has dismantled a criminal proxy network...
admin
May 9, 2025
The North Korean threat actors behind the Contagious Interview campaign have been observed using updated versions of...
admin
May 9, 2025
Cybersecurity researchers are warning of a new campaign that's targeting Portuguese-speaking users in Brazil with trial versions...
admin
May 9, 2025
AI agents are changing the way businesses work. They can answer questions, automate tasks, and create better...
admin
May 9, 2025
Cybersecurity researchers have flagged three malicious npm packages that are designed to target the Apple macOS version...
admin
May 9, 2025
The Vulnerability Treadmill
The reactive nature of vulnerability management, combined with delays from policy and process, strains security...
