admin
March 17, 2025
An unpatched security flaw impacting the Edimax IC-7100 network camera is being exploited by threat actors to...
admin
March 17, 2025
From sophisticated nation-state campaigns to stealthy malware lurking in unexpected places, this week’s cybersecurity landscape is a...
admin
March 17, 2025
The latest Palo Alto Networks Unit 42 Cloud Threat Report found that sensitive data is found in...
admin
March 17, 2025
Cybersecurity researchers are calling attention to an incident in which the popular GitHub Action tj-actions/changed-files was compromised...
admin
March 15, 2025
Cybersecurity researchers have warned of a malicious campaign targeting users of the Python Package Index (PyPI) repository...
Alleged Israeli LockBit Developer Rostislav Panev Extradited to U.S. for Cybercrime Charges
2 min read
admin
March 14, 2025
A 51-year-old dual Russian and Israeli national who is alleged to be a developer of the LockBit...
admin
March 14, 2025
The GSM Association (GSMA) has formally announced support for end-to-end encryption (E2EE) for securing messages sent via...
admin
March 14, 2025
Cyber threats evolve daily. In this live webinar, learn exactly how ransomware attacks unfold—from the initial breach...
admin
March 14, 2025
Most microsegmentation projects fail before they even get off the ground—too complex, too slow, too disruptive. But...
admin
March 14, 2025
Users searching for pirated software are the target of a new malware campaign that delivers a previously...
admin
March 14, 2025
A new malware campaign has been observed leveraging social engineering tactics to deliver an open-source rootkit called...
admin
March 13, 2025
As IT environments grow more complex, IT professionals are facing unprecedented pressure to secure business-critical data. With...
admin
March 13, 2025
Microsoft has shed light on an ongoing phishing campaign that targeted the hospitality sector by impersonating online...
North Korea’s ScarCruft Deploys KoSpy Malware, Spying on Android Users via Fake Utility Apps
4 min read
admin
March 13, 2025
The North Korea-linked threat actor known as ScarCruft is said to have been behind a never-before-seen Android...
admin
March 13, 2025
Two high-severity security flaws have been disclosed in the open-source ruby-saml library that could allow malicious actors...
admin
March 13, 2025
Meta has warned that a security vulnerability impacting the FreeType open-source font rendering library may have been...
WARNING: Expiring Root Certificate May Disable Firefox Add-Ons, Security Features, and DRM Playback
2 min read
admin
March 13, 2025
Browser maker Mozilla is urging users to update their Firefox instances to the latest version to avoid...
admin
March 12, 2025
Threat intelligence firm GreyNoise is warning of a "coordinated surge" in the exploitation of Server-Side Request Forgery...
admin
March 12, 2025
The China-nexus cyber espionage group tracked as UNC3886 has been observed targeting end-of-life MX routers from Juniper...
admin
March 12, 2025
We’ve been hearing the same story for years: AI is coming for your job. In fact, in...
